Total 39,785 skills
Showing 12 of 39785 skills
Get the latest changelog for Claude Code. Trigger words: claude changelog, what's new in CC, claude code updates, latest version, what's new in claude code
Microsoft Office document manipulation (Word, Excel, PowerPoint, PDF). Use when: creating professional .docx documents, filling PDF forms, extracting tables from PDFs, building presentations, working with spreadsheets, or any task involving Office file formats. Triggers: Word, Excel, PowerPoint, PDF, .docx, .xlsx, .pptx, spreadsheet, presentation, slides, form, invoice, report, memo, letter, budget, financial model.
Plotly Chart Generator - Auto-activating skill for Visual Content. Triggers on: plotly chart generator, plotly chart generator Part of the Visual Content skill category.
Apply Fastify best practices when creating servers, plugins, routes, schemas, hooks, configuration, decorators, error handling, testing, and TypeScript integration. Use when writing or reviewing Fastify code, setting up a new Fastify project, or asking "How should I structure my Fastify app?"
Monitor Reddit communities worldwide to discover niche product opportunities — unmet pain points, frustrated users, tool-seeking posts — from high-purchasing-power markets (US, UK, EU, DACH, Nordics, JP, KR, AU). Use this skill whenever the user mentions Reddit, product opportunities, pain point hunting, market research, niche discovery, subreddit monitoring, or wants to find SaaS/product ideas from real user discussions. Also use for /reddit commands and /loop /reddit scheduled scans.
Investigate compromised Docker containers by analyzing images, layers, volumes, logs, and runtime artifacts to identify malicious activity and evidence.
Default task orchestrator for all development and investigation work. Classifies tasks, decomposes into parallel workstreams if appropriate, and routes execution through the recipe runner. Replaces ultrathink-orchestrator.
Tests web applications for Cross-Site Scripting (XSS) vulnerabilities by injecting JavaScript payloads into reflected, stored, and DOM-based contexts to demonstrate client-side code execution, session hijacking, and user impersonation. The tester identifies all injection points and output contexts, crafts context-appropriate payloads, and bypasses sanitization and CSP protections. Activates for requests involving XSS testing, cross-site scripting assessment, client-side injection testing, or JavaScript injection vulnerability testing.
Create forensically sound bit-for-bit disk images using dd and dcfldd while preserving evidence integrity through hash verification.
Analyzes malware command-and-control (C2) communication protocols to understand beacon patterns, command structures, data encoding, and infrastructure. Covers HTTP, HTTPS, DNS, and custom protocol C2 analysis for detection development and threat intelligence. Activates for requests involving C2 analysis, beacon detection, C2 protocol reverse engineering, or command-and-control infrastructure mapping.
Perform static analysis of malicious PDF documents using peepdf, pdfid, and pdf-parser to extract embedded JavaScript, shellcode, and suspicious objects.
Regular expression expert for crafting, debugging, and explaining patterns