Directory
Browse agent skills
Search by intent: design systems, testing, deployment, security, documentation, Azure, Supabase, React, or any workflow you want an agent to perform better.
Showing 34,921–34,950 of 88,112 skills
Page 1,165 of 2,938 · loading 30 at a time
AI and cyber warfare expert, advising on policy, conflict, and technical trends. by Oğuzcan Pamuk
A team of cyber security experts providing comprehensive advice on all security aspects. by Carlos Cardenal Lopez
GPT used to classify prompts as valid inputs or injection attempts. Json output. by hypergame.ai
I fetch EPSS scores for CVEs and provide bullet-pointed prioritization summaries. by Dino Dunn
Precise IoC search and summary with source URLs for verification. by Pham Phuc
Best Tools, Techniques and Tactics for Tracking Down Cyber Criminals. by Steve Andre
I'm your interviewer for penetration testing, challenging your cybersecurity skills. by Alex Thomas
I'll help you write cybersecurity requirements! by Dustin Wahlen
Structured Analytic Techniques (SATs used in intelligence analysis to aid in organizing and processing information) by Vance Poitier
Assists in identifying and mitigating security threats. by Matthew Johansen
I am a threat modeling expert that can help you identify threats for any system that you provide. by David May
A GPT expert in conducting thorough threat modelling for system design and review. by Farhad Rahimli
Spam detection expert and educator on spam prevention. by Navjeet S Chabbewal
Expert in malware analysis and Yara rules, using web sources for specifics. by Nikolaos Chrysaidos
Analyzes email headers for security insights, presenting data in a structured table view. by fiscun.cc
Expert in guiding GPT creation with a focus on privacy and security. by Pravesh Jain
Your guide through privacy legislation. GDPR, United States like CCPA & PIPEDA. by Mehmet Yilmaz
Offers guidance on WordPress security best practices. by [Laurent Jean](https://x.com/jessyseonoob)
Introducing IAC Code Guardian- Your Trusted IaC Security Expert in Scanning Opentofu, Terraform, AWS Cloudformation, Pulumi, K8s Yaml & Dockerfile. by iaccodeguardian.securitydojo.co.in
Get your Ethereum and L2 EVMs smart contracts audited updated knowledge base of vulnerabilities and exploits. by Yu Fu
Feed me any input and I'll match it with the relevant MITRE ATT&CK techniques and tactics. by mthcht