Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 46,975 skills

Categories

Showing 12 of 46975 skills

Per page
Downloads
Sort
Security & Complianceyaklang/hack-skills

hack

Entry P0 primary router for HackSkills. Use when the task involves web application testing, API security assessment, recon, vulnerability triage, exploit path planning, or choosing the right next category skill before any deep topic skill.

🇨🇳|ChineseTranslated
2
Security & Complianceyaklang/hack-skills

open-redirect

Open redirect playbook. Use when URL parameters, form actions, or JavaScript sinks control navigation targets and may redirect users to attacker-controlled destinations.

🇺🇸|EnglishTranslated
2
Security & Complianceyaklang/hack-skills

nosql-injection

NoSQL injection playbook. Use when MongoDB-style operators, JSON query objects, flexible search filters, or backend query DSLs may allow data or logic abuse.

🇺🇸|EnglishTranslated
2
Security & Complianceyaklang/hack-skills

unauthorized-access-common-services

Unauthorized access playbook for common exposed services. Use when Redis, Rsync, PHP-FPM, AJP/Ghostcat, Hadoop YARN, H2 Console, or similar management interfaces are exposed without authentication.

🇺🇸|EnglishTranslated
2
Document Processingintsig-textin/xparse-skil...

xparse-parse

Parse documents into clean markdown or structured JSON via the xparse-cli. Use this skill when the user provides a PDF, image, Office file, HTML, OFD, or other supported document and wants it read, converted, summarized, or prepared for downstream agent use. Handles encrypted PDFs, page ranges, markdown/text output, and detailed structured extraction. Prefer this skill whenever the task starts from a local file or document URL and the first step is to turn it into agent-friendly content rather than manually inspect the raw file.

🇺🇸|EnglishTranslated
2
Tools & Utilitiescylqwe7855-alt/personal-w...

wiki

Build a personal knowledge wiki from your notes, journals, and documents. LLM ingests data, synthesizes cross-linked Wikipedia-style articles, and serves a web UI.

🇺🇸|EnglishTranslated
2
Tools & Utilitiesmembranedev/application-s...

aylien-news-api

Aylien News API integration. Manage data, records, and automate workflows. Use when the user wants to interact with Aylien News API data.

🇺🇸|EnglishTranslated
2
Tools & Utilitiesmembranedev/application-s...

firecrawl

Firecrawl integration. Manage data, records, and automate workflows. Use when the user wants to interact with Firecrawl data.

🇺🇸|EnglishTranslated
2
Security & Complianceyaklang/hack-skills

tunneling-and-pivoting

Tunneling and pivoting playbook. Use when establishing network tunnels through compromised hosts including SSH tunneling, Chisel, Ligolo-ng, socat, DNS/ICMP/HTTP tunneling, ProxyChains, and multi-layer pivoting strategies.

🇺🇸|EnglishTranslated
2
Security & Complianceyaklang/hack-skills

subdomain-takeover

Subdomain takeover detection and exploitation playbook. Use when targets have dangling CNAME/NS/MX records pointing to deprovisioned cloud resources, expired third-party services, or unclaimed SaaS tenants that an attacker can register to serve content under the victim's domain.

🇺🇸|EnglishTranslated
2
Security & Complianceyaklang/hack-skills

dangling-markup-injection

Dangling markup injection playbook. Use when HTML injection is possible but JavaScript execution is blocked (CSP, sanitizer strips event handlers, WAF blocks script tags) — exfiltrate CSRF tokens, session data, and page content by injecting unclosed HTML tags that capture subsequent page content.

🇺🇸|EnglishTranslated
2
Security & Complianceyaklang/hack-skills

rsa-attack-techniques

RSA attack playbook for CTF and real-world cryptanalysis. Use when given RSA parameters (n, e, c) and need to recover plaintext by exploiting weak keys, small exponents, shared factors, or padding oracles.

🇺🇸|EnglishTranslated
2
1...37573758375937603761...3915
Page