{s}skillry

Browse Skills

92 skills available

# pentest-checklist.md00
export Pentest Checklist
 

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define

security
Mar 1, 2026
00
# api-security-best-practices.md00
export api-security-best-practices
 

Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities

security
Mar 1, 2026
00
# sql-injection-testing.md00
export SQL Injection Testing
 

This skill should be used when the user asks to "test for SQL injection vulnerabilities", "perform SQLi attacks", "bypass authentication using SQL injection", "

security
Mar 1, 2026
00
# google-analytics.md00
export google-analytics
 

Analyze Google Analytics data, review website performance metrics, identify traffic patterns, and suggest data-driven improvements. Use when the user asks about

analytics
Mar 1, 2026
00
# vulnerability-scanner.md00
export vulnerability-scanner
 

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

security
Mar 1, 2026
00
# wireshark-network-traffic-analysis.md00
export Wireshark Network Traffic Analysis
 

This skill should be used when the user asks to "analyze network traffic with Wireshark", "capture packets for troubleshooting", "filter PCAP files", "follow TC

security
Mar 1, 2026
00
# security-ownership-map.md00
export security-ownership-map
 

Analyze git repositories to build a security ownership topology (people-to-file), compute bus factor and sensitive-code ownership, and export CSV/JSON for graph

security
Mar 1, 2026
00
# web-quality-audit.md00
export web-quality-audit
 

Comprehensive web quality audit covering performance, accessibility, SEO, and best practices. Use when asked to "audit my site", "review web quality", "run ligh

development
Mar 1, 2026
00
# red-team-tactics.md00
export red-team-tactics
 

Red team tactics principles based on MITRE ATT&CK. Attack phases, detection evasion, reporting.

security
Mar 1, 2026
00
# command-development.md00
export Command Development
 

This skill should be used when the user asks to "create a slash command", "add a command", "write a custom command", "define command arguments", "use command fr

development
Mar 1, 2026
00
# changelog-generator-2.md00
export changelog-generator
 

Automatically creates user-facing changelogs from git commits by analyzing commit history, categorizing changes, and transforming technical commits into clear,

engineering
Mar 1, 2026
00
# research-grants.md00
export research-grants
 

Write competitive research proposals for NSF, NIH, DOE, and DARPA. Agency-specific formatting, review criteria, budget preparation, broader impacts, significanc

scientific
Mar 1, 2026
00
← PrevPage 2 of 8Next →