120 skills
πŸ”

air-cryptographer

Safe 72

Design and audit AIR constraint systems

by ClementWalter

Zero-knowledge proof systems require mathematically sound AIR constraints to guarantee computational integrity. This skill provides expert guidance on trace design, boundary constraints, permutation arguments, and security review methodologies for ZK protocols.

Claude Codex Code(CC)
Install
πŸ”

1password-credential-lookup

Low Risk 71

Retrieve 1Password credentials by URL

by ClementWalter

AI agents need secure access to credentials for login automation. This skill provides URL-based lookup through 1Password CLI to retrieve usernames and passwords without exposing raw secrets in prompts.

Claude Codex Code(CC)
Install
πŸ”

verification-protocol

Safe 68

Verify AI Task Completion with Evidence

by CleanExpo

AI agents often claim success without proof. This protocol forces independent verification with concrete evidence before marking tasks complete. It eliminates false completions and ensures quality through objective validation.

Claude Codex Code(CC)
Install
πŸ”

web-auth

Safe 69

Implement secure web authentication

by CJHarmath

Building secure login flows and session management in React requires understanding multiple authentication patterns. This skill provides production-ready code examples for JWT, OAuth, cookies, and protected routes.

Claude Codex Code(CC)
Install
πŸ”

reconnaissance-knowledge

Medium Risk 61

Master Network Reconnaissance with Claude Code

by CharlesKozel

Security professionals need structured methodologies for authorized penetration testing and network reconnaissance. This skill provides comprehensive knowledge of reconnaissance tools, layered scanning strategies, and best practices for systematic information gathering in authorized security assessments.

Claude Codex Code(CC)
Install
πŸ”

privilege-escalation-knowledge

Safe 69

Escalate Linux privileges quickly

by CharlesKozel

Privilege escalation is complex and time-consuming. This knowledge base provides systematic methods to identify and exploit Linux privesc vectors including SUID binaries, sudo permissions, and kernel exploits.

Claude Codex Code(CC)
Install
🎯

pentest-coordinator

High Risk 57

Automate Penetration Testing with ReAct Methodology

by CharlesKozel

This skill provides structured autonomous penetration testing using ReAct loops. It maintains state, applies specialized security knowledge, and coordinates reconnaissance, exploitation, and privilege escalation until both flags are captured.

Claude Codex Code(CC)
Install
🎯

exploitation-knowledge

Safe 69

Apply exploitation techniques for penetration testing

by CharlesKozel

This skill provides structured guidance for vulnerability exploitation and initial access during authorized penetration tests. It covers exploit discovery, adaptation, shell establishment, and user flag capture using industry-standard tools and methodologies.

Claude Code(CC)
Install
🎯

coordinator

Medium Risk 64

Automate Penetration Testing with Strategic Coordination

by CharlesKozel

Manual penetration testing is time-consuming and requires deep expertise across multiple domains. This skill automates the entire process using a strategic coordinator that delegates tasks to specialized agents, ensuring comprehensive testing while you focus on high-level decisions.

Claude Code(CC)
Install
πŸ”

auth

Safe 71

Add authentication and payment features

by Chachamaru127

Users need secure ways to handle login and payments in their applications. This skill provides step-by-step guidance for implementing Clerk, Supabase Auth, and Stripe integrations with built-in security checklists.

Claude Code(CC)
Install
πŸ›‘οΈ

security

Safe 70

Validate security and scan for vulnerabilities

by ByronWilliamsCPA

Security vulnerabilities in code and dependencies can expose your project to attacks. This skill provides automated validation of GPG and SSH keys, runs vulnerability scanners, and guides compliance checking for secure development practices.

Claude Codex Code(CC)
Install
πŸ”

wsdiscovery

Low Risk 69

Discover ONVIF cameras and IoT devices

by BrownFineSecurity

Finding network devices like ONVIF cameras requires understanding the WS-Discovery protocol. This skill provides guidance for discovering and enumerating WS-Discovery enabled equipment on your network using the wsdiscovery tool.

Claude Codex Code(CC)
Install
πŸ”’

telnetshell

Medium Risk 64

Interact with IoT device shells via telnet

by BrownFineSecurity

This skill enables secure telnet interaction with IoT device shells for penetration testing. It provides automated device enumeration, security assessment commands, and firmware extraction capabilities for authorized security testing.

Claude Codex Code(CC)
Install
πŸ”Œ

picocom

Medium Risk 62

Connect to IoT UART Serial Consoles

by BrownFineSecurity

IoT devices often expose debug interfaces via serial connections. This skill provides tools to connect to UART consoles, enumerate device information, interact with bootloaders, and perform security testing on embedded systems.

Claude Codex Code(CC)
Install
πŸ“Ή

onvifscan

Low Risk 69

Scan ONVIF Devices for Security Vulnerabilities

by BrownFineSecurity

Assessing the security of IP cameras and ONVIF-enabled devices is critical for protecting surveillance infrastructure. This skill provides structured access to authentication testing and credential brute-forcing tools for authorized security assessments.

Claude Codex Code(CC)
Install
πŸ”

nmap

Medium Risk 63

Perform network reconnaissance with nmap

by BrownFineSecurity

Security professionals need to enumerate network services and identify vulnerabilities. This skill automates professional nmap port scanning with multiple scan types, service detection, and NSE scripts for comprehensive network reconnaissance.

Claude Codex Code(CC)
Install
πŸ“±

jadx

Safe 69

Decompile Android APKs for security analysis

by BrownFineSecurity

Android apps hide their code in DEX bytecode. This skill provides complete guidance for using jadx to convert APK files into readable Java source code. Analyze app logic, find vulnerabilities, and extract hardcoded credentials with expert techniques.

Claude Codex Code(CC)
Install
πŸ”’

iotnet

Low Risk 69

Analyze IoT network traffic for security issues

by BrownFineSecurity

Analyzing IoT network traffic manually is complex and time-consuming. This skill guides AI assistants to use the iotnet tool for automated detection of IoT protocols and security vulnerabilities in packet captures.

Claude Codex Code(CC)
Install
πŸ”

ffind

Safe 70

Analyze firmware and extract filesystems

by BrownFineSecurity

Security researchers need to identify file types and extract embedded filesystems from firmware images. This skill provides commands and guidance for using ffind to analyze binary files, detect file types, and extract ext2/3/4 or F2FS filesystems.

Claude Codex Code(CC)
Install
πŸ”’

chipsec

Safe 69

Analyze UEFI firmware for malware and vulnerabilities

by BrownFineSecurity

UEFI firmware attacks are stealthy and persistent. This skill uses Intel's chipsec framework to scan firmware dumps for known rootkits, detect vulnerabilities, and generate inventories of EFI modules. Analyze firmware safely offline without requiring hardware access.

Claude Codex Code(CC)
Install