Loading...
Loading...
Found 79 Skills
Validate security findings from commit-security-scan by assessing exploitability, filtering false positives, and generating proof-of-concept exploits. Use after running commit-security-scan to confirm vulnerabilities.
Enumerate and analyze client-side JavaScript for hidden endpoints, secrets, dangerous sinks, and exploitable browser behaviors.
Security code review for vulnerabilities. Use when asked to "security review", "find vulnerabilities", "check for security issues", "audit security", "OWASP review", or review code for injection, XSS, authentication, authorization, cryptography issues. Provides systematic review with confidence-based reporting.
Cryptography techniques for CTF challenges. Use when attacking encryption, hashing, ZKP, signatures, or mathematical crypto problems.
XXE XML外部实体注入测试的专业技能和方法论
Professional Skills and Methodologies for Deserialization Vulnerability Testing
Solve CTF (Capture The Flag) challenges by analyzing challenge descriptions, source code, and interacting with challenge environments to capture flags.
Professional Skills and Methodologies for Insecure Direct Object Reference (IDOR) Testing
Professional Skills and Methodologies for LDAP Injection Vulnerability Testing
文件上传漏洞测试的专业技能和方法论
Bypass a Coraza WAF protecting a vulnerable Next.js 16 backend. Analyze parser differentials between Go (WAF) and Node.js (backend) to find bypasses.
Professional Skills and Methodologies for Command Injection Vulnerability Testing