Search Skills
Search across 54932 indexed skills
replit-common-errors
Quick reference for the 10 most common Replit errors with real solutions. Covers container lifecycle, Nix configuration, database, deployment, and net...
android-coroutines
This skill provides authoritative rules and patterns for writing production-quality Kotlin Coroutines code on Android. It enforces structured concurre...
performing-user-behavior-analytics
Use this skill when: SOC teams need to detect compromised accounts through abnormal authentication patterns Insider threat programs require behavioral...
notion-spec-to-implementation
Convert a Notion spec into linked implementation plans, tasks, and ongoing status updates. 1) Locate the spec with Notion:notion-search, then fetch it...
performing-vulnerability-scanning-with-nessus
Conducting initial vulnerability assessment during the reconnaissance phase of a penetration test Performing periodic vulnerability scans to maintain ...
performing-asset-criticality-scoring-for-vulns
Asset criticality scoring assigns a business impact rating to each IT asset so that vulnerability remediation efforts focus on systems with the greate...
performing-graphql-depth-limit-attack
GraphQL depth limit attacks exploit the recursive nature of GraphQL schemas to craft deeply nested queries that consume excessive server resources, le...
implementing-privileged-session-monitoring
Deploying or configuring session recording for all privileged access to critical servers and databases Meeting compliance requirements (PCI-DSS 10.2, ...
detecting-misconfigured-azure-storage
When performing a security audit of Azure Storage accounts across subscriptions When responding to Microsoft Defender for Storage alerts about anonymo...
implementing-file-integrity-monitoring-with-aide
AIDE (Advanced Intrusion Detection Environment) is a host-based intrusion detection system that monitors file and directory integrity using cryptograp...
extracting-browser-history-artifacts
When investigating user web activity as part of a forensic examination During insider threat investigations to establish patterns of data exfiltration...
exploiting-sql-injection-vulnerabilities
Testing web application input parameters for SQL injection vulnerabilities during an authorized penetration test Validating that parameterized queries...