ClaudSkillsGeneral › Page 292

General-Purpose Claude Skills (Page 292 of 366)

Productivity, automation, knowledge management, integrations, AI tooling, and general-purpose skills for Claude Code.

21,927 skills · updated 2026-05-03 · showing 17461–17520 of 21,927 by quality score

Performs API inventory and discovery to identify all API endpoints in an organization''s environment including
Score 70/100
Conduct forensic investigations in cloud environments by collecting and analyzing logs, snapshots, and metadata
Score 70/100
Execute cloud-native incident containment across AWS, Azure, and GCP by isolating compromised resources, revoking
Score 70/100
Uses AWS Athena to query CloudTrail, VPC Flow Logs, S3 access logs, and ALB logs for forensic investigation.
Score 70/100
Detects container escape attempts by analyzing namespace configurations, privileged container checks, dangerous
Score 70/100
Conducts disk forensics investigations using forensic imaging, file system analysis, artifact recovery, and
Score 70/100
Execute a phased DMARC rollout from p=none monitoring through p=quarantine to p=reject enforcement, ensuring
Score 70/100
Enumerates DNS records, attempts zone transfers, brute-forces subdomains, and maps DNS infrastructure during
Score 70/100
Detects DNS tunneling by computing Shannon entropy of DNS query names, analyzing query length distributions,
Score 70/100
Performs digital forensics investigation on compromised endpoints including memory acquisition, disk imaging,
Score 70/100
Performs entitlement review and access certification campaigns using SailPoint IdentityIQ including manager
Score 70/100
Recover files from disk images and unallocated space using Foremost's header-footer signature carving to extract
Score 70/100
Performs firmware image extraction and analysis using binwalk to identify embedded filesystems, compressed archives,
Score 70/100
Perform coverage-guided fuzzing of compiled binaries using AFL++ (American Fuzzy Lop Plus Plus) to discover
Score 70/100
Detects lateral movement techniques including Pass-the-Hash, PsExec, WMI execution, RDP pivoting, and SMB-based
Score 70/100
Perform lateral movement across Windows networks using WMI-based remote execution techniques including Impacket
Score 70/100
Analyze volatile memory dumps using Volatility 3 to extract running processes, network connections, loaded modules,
Score 70/100
Bypasses SSL/TLS certificate pinning implementations in Android and iOS applications to enable traffic interception
Score 70/100
Acquire and analyze mobile device data using Cellebrite UFED and open-source tools to extract communications,
Score 70/100
Open Source Intelligence (OSINT) gathering is the first active phase of a red team engagement, where operators
Score 70/100
Guides agents through launching, playing, sculpting, and capturing performances with the Orthonotone polychoral instrument MVP.
Score 70/100
Automate OSINT collection using SpiderFoot REST API and CLI for target profiling, module-based reconnaissance,
Score 70/100
Automates the Privacy Impact Assessment (PIA) workflow including data flow mapping, privacy risk scoring matrices,
Score 70/100
Performs privilege escalation assessments on compromised Linux and Windows systems to identify paths from low-privilege
Score 70/100
Linux privilege escalation involves elevating from a low-privilege user account to root access on a compromised
Score 70/100
Conduct systematic reviews of privileged accounts to validate access rights, identify excessive permissions,
Score 70/100
Discover and inventory all privileged accounts across enterprise infrastructure including domain admins, local
Score 70/100
Performs purple team exercises by coordinating red team adversary emulation with blue team detection validation
Score 70/100
Audit service accounts across enterprise infrastructure to identify orphaned, over-privileged, and non-compliant
Score 70/100
Automate credential rotation for service accounts across Active Directory, cloud platforms, and application databases
Score 70/100
Automates SOC 2 Type II audit preparation including gap assessment against AICPA Trust Services Criteria (CC1-CC9),
Score 70/100
Detect and extract hidden data embedded in images, audio, and other media files using steganalysis tools to uncover
Score 70/100
Enumerate subdomains of target domains using ProjectDiscovery's Subfinder passive reconnaissance tool to map
Score 70/100
Build comprehensive forensic super-timelines using Plaso (log2timeline) to correlate events across file systems,
Score 70/100
Performs User and Entity Behavior Analytics (UEBA) to detect anomalous user activities including impossible
Score 70/100
Nikto is an open-source web server and web application scanner that tests against over 7,000 potentially dangerous
Score 70/100
Captures WPA/WPA2 handshakes and performs offline password cracking using aircrack-ng, hashcat, and dictionary
Score 70/100
Perform comprehensive Windows forensic artifact analysis using Eric Zimmerman's open-source EZ Tools suite including
Score 70/100
Cria novas páginas de perícia de cartas Pokémon TCG graduadas usando o template padronizado. Use quando o usuário pedir para criar uma nova perícia, laudo de carta, ou adicionar…
Score 70/100
Automate Perigon tasks via Rube MCP (Composio). Always search tools first for current schemas.
Score 70/100
Modern Perl 5.36+ idioms, best practices, and conventions for building robust, maintainable Perl applications.
Score 70/100
Layer child permission rules over parent session policy without dropping root-level grants or mutating shared state.
Score 70/100
Generates pre-permission priming screens that explain benefits before showing iOS system permission dialogs.
Score 70/100
Create child communication safety experiences using PermissionKit to request parental permission for children.
Score 70/100
Configures Claude Code permissions for safe agent autonomy. Creates settings.json with allow/deny rules and a path-restriction hook.
Score 70/100
Execute Perplexity primary workflow: single-query search with citations. Use when implementing AI search, building fact-checking tools, or integrating web-grounded answers into…
Score 70/100
Improve chapter perplexity score by rewriting AI-suspect sentences. Use after writing a chapter to reduce detectable AI patterns.
Score 70/100
Execute Perplexity incident response procedures with triage, mitigation, and postmortem. Use when responding to Perplexity API outages, investigating search failures, or running…
Score 70/100
Install and configure Perplexity Sonar API authentication. Use when setting up a new Perplexity integration, configuring API keys, or initializing the OpenAI-compatible client for…
Score 70/100
Identify and avoid Perplexity anti-patterns and common integration mistakes. Use when reviewing Perplexity code, onboarding new developers, or auditing existing integrations for…
Score 70/100
Load test Perplexity Sonar API integrations and plan capacity. Use when running performance tests, planning for traffic growth, or benchmarking Perplexity latency under load.
Score 70/100
Migrate to Perplexity Sonar from other search/LLM APIs using the strangler fig pattern. Use when switching from Google Custom Search, Bing API, or other LLMs to Perplexity, or…
Score 70/100
Configure Perplexity Sonar API across development, staging, and production environments. Use when setting up multi-environment search integrations, managing API keys per…
Score 70/100
Set up monitoring for Perplexity Sonar API with latency, cost, citation quality, and error tracking. Use when implementing monitoring dashboards, setting up alerts, or tracking…
Score 70/100
Implement content moderation, model selection policy, citation quality enforcement, and per-user usage quotas for Perplexity Sonar API.
Score 70/100
Implement reliability patterns for Perplexity Sonar API: circuit breaker, model fallback, streaming timeout, and citation validation.
Score 70/100
Migrate between Perplexity model generations and API parameter changes. Use when upgrading to new Sonar models, handling deprecated parameters, or migrating from legacy pplx-api…
Score 70/100
Automate Perplexityai tasks via Rube MCP (Composio). Always search tools first for current schemas.
Score 70/100
Use when legacy prompts or older framework flows reference `perseus` and you need the modern runtime to resolve that capability cleanly.
Score 70/100
Update session config (CLAUDE.md, GEMINI.md, memory, procedures) with permanent rules or conventions
Score 70/100
Search all 21,927 General skills →