Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 40,256 skills

Categories

Showing 12 of 40256 skills

Per page
Downloads
Sort
Security & Complianceyaklang/hack-skills

classical-cipher-analysis

Classical cipher analysis playbook. Use when encountering substitution ciphers, Vigenere, transposition, XOR, or encoded text in CTF challenges that requires frequency analysis, Kasiski examination, or known-plaintext cryptanalysis.

🇺🇸|EnglishTranslated
1
Security & Complianceyaklang/hack-skills

symmetric-cipher-attacks

Symmetric cipher attack playbook. Use when exploiting block cipher mode weaknesses (CBC padding oracle, ECB cut-and-paste, bit flipping), stream cipher key reuse, or meet-in-the-middle attacks.

🇺🇸|EnglishTranslated
1
Security & Complianceyaklang/hack-skills

active-directory-certificate-services

AD Certificate Services attack playbook. Use when targeting misconfigured AD CS for privilege escalation via ESC1-ESC13 template abuse, NTLM relay to enrollment, CA officer abuse, and certificate-based persistence.

🇺🇸|EnglishTranslated
1
Security & Complianceyaklang/hack-skills

csp-bypass-advanced

Advanced Content Security Policy bypass techniques. Use when XSS or data exfiltration is blocked by CSP and you need to find policy weaknesses, trusted endpoint abuse, nonce leakage, or exfiltration channels that CSP cannot block.

🇺🇸|EnglishTranslated
1
Security & Complianceyaklang/hack-skills

active-directory-acl-abuse

Active Directory ACL abuse playbook. Use when exploiting misconfigured AD permissions including GenericAll, WriteDACL, DCSync rights, shadow credentials, LAPS reading, GPO abuse, and BloodHound-guided attack paths.

🇺🇸|EnglishTranslated
1
Platform Servicesmicrosoft/power-platform-...

add-server-logic

Creates, edits, and manages Power Pages Server Logic files — server-side JavaScript that runs securely on the Power Pages runtime. Orchestrates the full lifecycle: gathering requirements, fetching documentation, implementing code, configuring site settings, and deploying. Use when the user wants to add server-side code, create API endpoints, or move logic from the browser to the server in their Power Pages site.

🇺🇸|EnglishTranslated
1
2 scripts/Attention
Security & Compliancemukul975/anthropic-cybers...

performing-arp-spoofing-attack-simulation

Simulates ARP spoofing attacks in authorized lab or pentest environments using arpspoof, Ettercap, and Scapy to demonstrate man-in-the-middle risks, test network detection capabilities, and validate ARP inspection countermeasures.

🇺🇸|EnglishTranslated
1
1 scripts/Checked
AI & Machine Learningeveryinc/compound-enginee...

ce-dspy-ruby

Build type-safe LLM applications with DSPy.rb — Ruby's programmatic prompt framework with signatures, modules, agents, and optimization. Use when implementing predictable AI features, creating LLM signatures and modules, configuring language model providers, building agent systems with tools, optimizing prompts, or testing LLM-powered functionality in Ruby applications.

🇺🇸|EnglishTranslated
1
3 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

performing-active-directory-forest-trust-attack

Enumerate and audit Active Directory forest trust relationships using impacket for SID filtering analysis, trust key extraction, cross-forest SID history abuse detection, and inter-realm Kerberos ticket assessment.

🇺🇸|EnglishTranslated
1
1 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

exploiting-ms17-010-eternalblue-vulnerability

MS17-010 (EternalBlue) is a critical vulnerability in Microsoft's SMBv1 implementation that allows remote code execution. Originally discovered by the NSA and leaked by the Shadow Brokers in 2017, it

🇺🇸|EnglishTranslated
1
2 scripts/Attention
Security & Compliancemukul975/anthropic-cybers...

exploiting-smb-vulnerabilities-with-metasploit

Identifies and exploits SMB protocol vulnerabilities using Metasploit Framework during authorized penetration tests to demonstrate risks from unpatched Windows systems, misconfigured shares, and weak authentication in enterprise networks.

🇺🇸|EnglishTranslated
1
1 scripts/Checked
Tools & Utilitiesmembranedev/application-s...

charisma

Charisma integration. Manage data, records, and automate workflows. Use when the user wants to interact with Charisma data.

🇺🇸|EnglishTranslated
1
1...3352335333543355
Page