Browse Skills

Analyzing Linux Audit Logs For Intrusion

v1.0.0

>

mukul975
5

Analyzing Network Packets With Scapy

v1.0.0

Craft, send, sniff, and dissect network packets using Scapy for protocol analysis, network reconnaissance, and traffic anomaly detection in authorized security testing

mukul975
4

Analyzing Office365 Audit Logs For Compromise

v1.0.0

Parse Office 365 Unified Audit Logs via Microsoft Graph API to detect email forwarding rule creation, inbox delegation, suspicious OAuth app grants, and other indicators of account compromise.

mukul975
5

Analyzing Outlook Pst For Email Forensics

v1.0.0

Analyze Microsoft Outlook PST and OST files for email forensic evidence including message content, headers, attachments, deleted items, and metadata using libpff, pst-utils, and forensic email analysis tools for legal investigations and incident response.

mukul975
4

Seo Forensic Incident Response

v1.0.0

Investigate sudden drops in organic traffic or rankings and run a structured forensic SEO incident response with triage, root-cause analysis and recovery plan.

sickn33
4

Service Mesh Expert

v1.0.0

Expert service mesh architect specializing in Istio, Linkerd, and cloud-native networking patterns. Masters traffic management, security policies, observability integration, and multi-cluster mesh con

sickn33
4

Skill Scanner

v1.0.0

Scan agent skills for security issues. Use when asked to "scan a skill",

sickn33
3

Smtp Penetration Testing

v1.0.0

This skill should be used when the user asks to \"perform SMTP penetration testing\", \"enumerate email users\", \"test for open mail relays\", \"grab SMTP banners\", \"brute force email cre...

sickn33
3

Solidity Security

v1.0.0

Master smart contract security best practices to prevent common vulnerabilities and implement secure Solidity patterns. Use when writing smart contracts, auditing existing contracts, or implementin...

sickn33
5

Sql Injection Testing

v1.0.0

This skill should be used when the user asks to \"test for SQL injection vulnerabilities\", \"perform SQLi attacks\", \"bypass authentication using SQL injection\", \"extract database inform...

sickn33
3

Sqlmap Database Pentesting

v1.0.0

This skill should be used when the user asks to \"automate SQL injection testing,\" \"enumerate database structure,\" \"extract database credentials using sqlmap,\" \"dump tables and columns...

sickn33
2

Ssh Penetration Testing

v1.0.0

This skill should be used when the user asks to \"pentest SSH services\", \"enumerate SSH configurations\", \"brute force SSH credentials\", \"exploit SSH vulnerabilities\", \"perform SSH tu...

sickn33
4