AI Skills for Security Engineer
Discover 3679+ AI skills for security engineers
Install any skill with /learn
/learn @owner/skill-nameBrowse AI Skills for Security Engineer
affaan-m / security-review
Ensures code adheres to security best practices, providing a comprehensive checklist for authentication, input validation, and sensitive data handling.
affaan-m / django-security
Provides comprehensive guidelines for securing Django applications against common vulnerabilities and ensuring safe deployment.
affaan-m / security-scan
Scans Claude Code settings for security vulnerabilities using AgentShield, ensuring safe configurations and mitigating risks.
affaan-m / springboot-security
Implements best practices for security in Java Spring Boot applications, covering authentication, authorization, and data protection.
wshobson / k8s-security-policies
Implements Kubernetes security policies for production-grade security, including RBAC and network isolation for clusters.
wshobson / sast-configuration
Configures SAST tools for automated vulnerability detection, enhancing security in application code through effective DevSecOps practices.
wshobson / mtls-configuration
Enables secure service-to-service communication using mutual TLS in zero-trust networking environments.
wshobson / stride-analysis-patterns
Utilizes the STRIDE methodology for systematic threat identification in security analysis and documentation.
wshobson / auth-implementation-patterns
Master authentication and authorization patterns to build secure, scalable access control systems for APIs and applications.
wshobson / memory-forensics
Equips users with advanced memory forensics techniques for incident response and malware analysis using tools like Volatility.
wshobson / protocol-reverse-engineering
Equips users with advanced techniques for network protocol reverse engineering, including packet analysis and protocol documentation.
wshobson / anti-reversing-techniques
Equips analysts with techniques to bypass software protections for authorized analysis, enhancing malware research and security assessments.
wshobson / security-requirement-extraction
Transforms threat analysis into actionable security requirements for effective compliance and risk management.
wshobson / threat-mitigation-mapping
Maps threats to security controls for effective risk management and prioritization of security investments.
wshobson / attack-tree-construction
Visualizes threat paths through comprehensive attack trees, aiding in identifying defense gaps and communicating security risks.
davila7 / security-review
Ensures code adheres to security best practices, identifying vulnerabilities in authentication, API endpoints, and sensitive data handling.
sickn33 / laravel-security-audit
Audits Laravel applications for security vulnerabilities, ensuring compliance with OWASP standards and best practices.
sickn33 / active-directory-attacks
Provides techniques for attacking Microsoft Active Directory, covering reconnaissance, credential harvesting, and privilege escalation.
sickn33 / api-fuzzing-bug-bounty
Provides techniques for testing API security, identifying vulnerabilities, and conducting penetration testing for REST, SOAP, and GraphQL APIs.
sickn33 / aws-penetration-testing
Provides techniques for penetration testing AWS environments, covering IAM enumeration, privilege escalation, and security audits.