Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 36,883 skills

Categories

Showing 12 of 36883 skills

Per page
Downloads
Sort
Security & Complianceyaklang/hack-skills

lattice-crypto-attacks

Lattice-based cryptanalysis playbook. Use when attacking RSA via Coppersmith small roots, recovering DSA/ECDSA nonces from bias, solving knapsack problems, or applying LLL/BKZ reduction to cryptographic constructions.

🇺🇸|EnglishTranslated
3
Security & Complianceyaklang/hack-skills

binary-protection-bypass

Binary protection bypass playbook. Use when identifying and bypassing ASLR, PIE, NX/DEP, stack canary, RELRO, FORTIFY_SOURCE, CET, and MTE protections in ELF binaries to enable exploitation.

🇺🇸|EnglishTranslated
3
Security & Complianceyaklang/hack-skills

linux-lateral-movement

Linux lateral movement playbook. Use after gaining initial access to pivot across Linux hosts via SSH hijacking, credential harvesting, internal pivoting, D-Bus exploitation, sudo token reuse, and shared filesystem abuse.

🇺🇸|EnglishTranslated
3
Security & Complianceyaklang/hack-skills

macos-security-bypass

macOS security bypass playbook. Use when targeting macOS endpoints and need to bypass TCC, Gatekeeper, SIP, sandbox, code signing, or entitlement-based protections during authorized red team or pentest engagements.

🇺🇸|EnglishTranslated
3
Security & Complianceyaklang/hack-skills

dns-rebinding-attacks

DNS rebinding attack playbook. Use when testing applications that trust DNS resolution for origin checks, interact with internal services from browser context, or when SSRF is not possible server-side but the target has client-side fetch/XHR to attacker-controlled domains.

🇺🇸|EnglishTranslated
3
Security & Complianceyaklang/hack-skills

http-host-header-attacks

HTTP Host header injection and routing abuse playbook. Use when the application trusts the Host header for generating URLs, routing requests, or access control — enabling password reset poisoning, web cache poisoning, SSRF via routing, and virtual host bypass.

🇺🇸|EnglishTranslated
3
Security & Complianceyaklang/hack-skills

windows-av-evasion

AV/EDR evasion playbook for Windows. Use when bypassing AMSI, ETW, .NET assembly detection, shellcode execution, process injection, API hooking, and signature-based detection on Windows endpoints.

🇺🇸|EnglishTranslated
3
AI & Machine Learningbacktthefuture/huangshu

advisory-board

Uncle Huang's Private Advisory Board — a business decision think tank composed of 12 top thinkers. With a structured private advisory board process, different cognitive frameworks collide to produce optimal decisions. Trigger scenarios: - Users say "start a private advisory board", "invite the think tank", "help me make decisions" - Users say "Private Advisory Board: [topic]", "Let the experts discuss this matter" - Users use the /私董会 or /advisory-board command - Users face major business decisions requiring multi-perspective analysis Non-trigger scenarios: - Simple operational issues (how to publish, how to typeset) - Pure technical issues (code debugging) - Daily content creation (use article-writer / topic-partner) - Personal emotional counseling (use life-coach)

🇨🇳|ChineseTranslated
3
AI & Machine Learningthedotmack/claude-mem

knowledge-agent

Build and query AI-powered knowledge bases from claude-mem observations. Use when users want to create focused "brains" from their observation history, ask questions about past work patterns, or compile expertise on specific topics.

🇺🇸|EnglishTranslated
3
Project Managementazidan/archflow

archflow

Phase-based development workflow manager that guides projects through structured phases from strategy and design through implementation, quality assurance, and launch. Manages roadmaps, feature branches, agent orchestration, and MCP server configuration.

🇺🇸|EnglishTranslated
3
Tools & Utilitiesdegausai/wonda

wonda-cli

Using the Wonda CLI to generate images, videos, music, and audio from the terminal — plus LinkedIn, Reddit, and X/Twitter research and automation

🇺🇸|EnglishTranslated
3
Frontend Developmentiblai/vibe

iblai-build

Build and run your ibl.ai app on desktop and mobile (iOS, Android, macOS, Surface)

🇺🇸|EnglishTranslated
3
1...20622063206420652066...3074
Page