wsdiscovery
Low Risk 67Discover ONVIF cameras and IoT devices
by BrownFineSecurity
Finding network devices like ONVIF cameras requires understanding the WS-Discovery protocol. This skill provides guidance for discovering and enumerating WS-Discovery enabled equipment on your network using the wsdiscovery tool.
telnetshell
Medium Risk 63Interact with IoT device shells via telnet
by BrownFineSecurity
This skill enables secure telnet interaction with IoT device shells for penetration testing. It provides automated device enumeration, security assessment commands, and firmware extraction capabilities for authorized security testing.
picocom
Medium Risk 61Connect to IoT UART Serial Consoles
by BrownFineSecurity
IoT devices often expose debug interfaces via serial connections. This skill provides tools to connect to UART consoles, enumerate device information, interact with bootloaders, and perform security testing on embedded systems.
nmap
Medium Risk 63Perform network reconnaissance with nmap
by BrownFineSecurity
Security professionals need to enumerate network services and identify vulnerabilities. This skill automates professional nmap port scanning with multiple scan types, service detection, and NSE scripts for comprehensive network reconnaissance.
onvifscan
Low Risk 67Scan ONVIF Devices for Security Vulnerabilities
by BrownFineSecurity
Assessing the security of IP cameras and ONVIF-enabled devices is critical for protecting surveillance infrastructure. This skill provides structured access to authentication testing and credential brute-forcing tools for authorized security assessments.
jadx
Safe 69Decompile Android APKs for security analysis
by BrownFineSecurity
Android apps hide their code in DEX bytecode. This skill provides complete guidance for using jadx to convert APK files into readable Java source code. Analyze app logic, find vulnerabilities, and extract hardcoded credentials with expert techniques.
iotnet
Low Risk 68Analyze IoT network traffic for security issues
by BrownFineSecurity
Analyzing IoT network traffic manually is complex and time-consuming. This skill guides AI assistants to use the iotnet tool for automated detection of IoT protocols and security vulnerabilities in packet captures.
ffind
Safe 70Analyze firmware and extract filesystems
by BrownFineSecurity
Security researchers need to identify file types and extract embedded filesystems from firmware images. This skill provides commands and guidance for using ffind to analyze binary files, detect file types, and extract ext2/3/4 or F2FS filesystems.
chipsec
Safe 69Analyze UEFI firmware for malware and vulnerabilities
by BrownFineSecurity
UEFI firmware attacks are stealthy and persistent. This skill uses Intel's chipsec framework to scan firmware dumps for known rootkits, detect vulnerabilities, and generate inventories of EFI modules. Analyze firmware safely offline without requiring hardware access.
apktool
Safe 69Unpack and Analyze Android APK Files
by BrownFineSecurity
Analyzing Android apps for security issues requires extracting and examining their internal structure. This skill guides you through APK unpacking, manifest analysis, and secret discovery using apktool.
auth
Safe 71Implement authentication and access control
by BOM-98
This skill helps you add secure user authentication to Next.js applications. It provides ready-to-use patterns for Supabase Auth with httpOnly cookies, route protection, and role-based access control.
security-guardian
Safe 68Detect security vulnerabilities and audit code
by Bikach
This skill provides expert guidance for identifying security vulnerabilities in code and implementing secure coding practices. It covers OWASP Top 10, authentication, authorization, cryptography, and secrets management.
better-auth-best-practices
Safe 70Configure Better Auth authentication securely
by better-auth
Setting up authentication can be complex with many security considerations. This skill provides proven patterns for Better Auth configuration, session management, and plugin integration.
security-sentinel
Safe 69Secure Your Next.js 15 Apps with OWASP Best Practices
by Barnhardt-Enterprises-Inc
Build secure applications by following OWASP Top 10 guidelines. This comprehensive reference includes authentication patterns, vulnerability prevention guides, and automated security scanning for your codebase.
pitfalls-security
Safe 69Implement secure authentication patterns
by BarisSozen
Security vulnerabilities in authentication, caching, and logging expose sensitive user data and credentials. This skill provides verified patterns to prevent common mistakes when handling session keys, environment variables, and sensitive data.
auth
Low Risk 65Implement secure authentication patterns
by Azeem-2
Building secure authentication requires understanding JWT tokens, OAuth2 flows, and access control patterns. This skill provides production-ready implementations for authentication, authorization, MFA, and zero-trust security that work with any framework.
jwt-auth
Safe 71Implement JWT authentication in FastAPI
by Awais68
Building secure JWT authentication requires understanding token creation, verification, and role-based access control patterns. This skill provides expert implementations and workflows for adding authentication to FastAPI and Python applications with minimal security risks.
auth-integration
Safe 68Implement Secure Authentication with Better Auth
by Awais68
Applications need secure authentication with login forms, session handling, and access control. This skill provides expert guidance for Better Auth/NextAuth v5 implementation including provider setup, validated forms, protected routes, and role-based permissions.
configuring-better-auth
Safe 76Configure Better Auth OAuth 2.1 and OIDC
by Asmayaseen
This skill helps developers implement secure OAuth 2.1 and OIDC authentication using Better Auth framework. It provides step-by-step guidance for setting up centralized authentication servers with SSO, PKCE flows, and JWKS token verification.
security-checklist
Safe 68Apply OWASP Top 10 Security Best Practices
by ArieGoldkin
Applications often ship with critical security vulnerabilities. This skill provides AI agents with comprehensive security checklists based on OWASP Top 10. Agents can use it to identify and prevent vulnerabilities like injection attacks, broken authentication, and sensitive data exposure before code reaches production.