Not on Product Hunt
Claude Skills
AI Agentssoon
Workflowssoon
Creators

Not on Product Hunt

1,496 curated Claude Skills. We rejected 2,904 so you don't have to.

Categories

DevelopmentMarketingSecurityIntegrationsOperationsLegal

Resources

Submit a SkillSearch SkillsCreatorsSitemapllms.txt

Legal

Privacy PolicyTerms of Service

© 2025 Not on Product Hunt. Not affiliated with Product Hunt.

Built for the Claude community

AllDevelopmentMarketingSecurityIntegrationsOperationsLegal
PopularNewRating
security

API Fuzzing for Bug Bounty

Execute systematic fuzzing attacks on REST, SOAP, and GraphQL APIs to discover vulnerabilities including IDOR, authentication bypass, and injection flaws.

Ssickn33
0
security

Secure API Design Implementation

Implement authentication, authorization, input validation, rate limiting, and OWASP API Top 10 protections for REST, GraphQL, and WebSocket APIs.

Ssickn33
0
security

AWS Penetration Testing Framework

Execute systematic AWS penetration tests covering IAM enumeration, privilege escalation, metadata exploitation, and persistence techniques for red team assessments.

Ssickn33
0
security

Azure Identity Java Authentication

Authenticate Java applications with Azure services using Microsoft Entra ID with DefaultAzureCredential and managed identities.

Ssickn33
0
security

Azure Identity Rust Authentication

Authenticate Rust applications to Azure using DeveloperToolsCredential, ManagedIdentityCredential, or ClientSecretCredential with Microsoft Entra ID.

Ssickn33
0
security

Azure Key Vault Keys Rust

Create, manage, and perform cryptographic operations on keys stored in Azure Key Vault using Rust SDK with complete code examples.

Ssickn33
0
security

Azure Key Vault Secrets Rust

Authenticate and manage secrets in Azure Key Vault using Rust SDK with get, set, delete, and version control operations.

Ssickn33
0
security

Binary Assembly Analysis Patterns

Decode compiled binaries using x86-64, ARM64, and ARM32 assembly patterns with calling conventions, control flow, and function structure recognition.

Ssickn33
0
security

Broken Authentication Testing

Test web applications for authentication vulnerabilities using systematic methodology across password policies, session handling, brute force, and credential stuffing attacks.

Ssickn33
0
security

Burp Suite Project Parser

Extract and search HTTP traffic, headers, and audit findings from Burp Suite project files using regex patterns and targeted filters.

Ssickn33
0
security

Security Code Review Checklist

Review code for vulnerabilities across secrets, input validation, SQL injection, and authentication using domain-specific checklists and safe code patterns.

Ssickn33
0
security

Repository Claude Settings Auditor

Analyze repository structure and generate safe Claude Code settings.json permissions for read-only bash commands.

Ssickn33
0
security

Differential Security Review

Conduct risk-first security code reviews on PRs with evidence-based findings, blast radius analysis, and adversarial modeling.

Ssickn33
0
security

Django IDOR & Access Control Auditor

Systematically investigate Django authorization implementations to find IDOR and access control vulnerabilities through code tracing and ownership model analysis.

Ssickn33
0
security

FDA Food Safety Auditor

Audit food facilities against FSMA, HACCP, and PCQI compliance standards; identify gaps in preventive controls and corrective actions.

Ssickn33
0
security

FDA MedTech Compliance Auditor

Audit medical device software against 21 CFR Part 820, IEC 62304, and ISO 13485 with severity-ranked findings and corrective actions.

Ssickn33
0
security

FFUF Web Fuzzing

Execute advanced web fuzzing for penetration testing using FFUF with multi-wordlist modes, authenticated requests, and intelligent filtering.

Ssickn33
0
security

File Path Traversal Testing

Identify and exploit file path traversal vulnerabilities to read arbitrary server files including credentials and source code.

Ssickn33
0
security

Code Security Bug Finder

Review code branches for security vulnerabilities, bugs, and quality issues using systematic attack surface mapping.

Ssickn33
0
security

GitHub Actions Security Reviewer

Audit GitHub Actions workflows for exploitable vulnerabilities using real attack patterns, requiring concrete exploitation scenarios for every finding.

Ssickn33
0
security

HTML Injection Testing

Identify and exploit HTML injection vulnerabilities in web applications using structured testing phases, payload examples, and remediation guidance.

Ssickn33
0
security

IDOR Vulnerability Testing

Systematically identify and exploit Insecure Direct Object Reference vulnerabilities using parameter manipulation, enumeration, and Burp Suite techniques.

Ssickn33
0
security

Laravel Security Audit

Analyze Laravel code for vulnerabilities, misconfigurations, and insecure practices using OWASP standards.

Ssickn33
0
security

Lightning Network Architecture Review

Review Bitcoin Lightning Network protocol designs, compare channel factory approaches, and analyze Layer 2 scaling tradeoffs with expert-level depth.

Ssickn33
0
security

Odoo Access Control Expert

Write correct Odoo security rules: ir.model.access.csv entries, ir.rule record restrictions, and multi-company access patterns.

Ssickn33
0
security

Penetration Testing Checklist

Execute comprehensive penetration tests using structured phases for scoping, preparation, execution, and remediation with specific task workflows.

Ssickn33
0
security

Penetration Testing Command Reference

Provide quick lookup for nmap, Metasploit, and exploitation commands during authorized security assessments.

Ssickn33
0
security

Privacy by Design Framework

Build privacy protections into app architecture from day one using GDPR, CCPA, LGPD principles—data minimization, consent, encryption, user rights.

Ssickn33
0
security

SAST Tool Configuration

Configure Static Application Security Testing tools (Semgrep, SonarQube, CodeQL) with custom rules, CI/CD integration, and quality gates.

Ssickn33
0
security

CI/CD Secrets Management

Implement secure secrets storage and rotation in CI/CD pipelines using Vault, AWS Secrets Manager, and cloud providers.

Ssickn33
0
security

SAST Code Vulnerability Scanner

Scan source code across 7 languages for injection, secrets, and framework vulnerabilities using Bandit, ESLint, Semgrep with triage workflow.

Ssickn33
0
security

AWS IAM Security Hardening

Audit IAM policies, enforce least privilege, detect overly permissive access, and validate MFA/key rotation compliance.

Ssickn33
0
security

Semgrep Rule Language Porter

Port existing Semgrep security rules to new target languages with applicability analysis and test-driven validation.

Ssickn33
0
security

Sharp Edges Security Analysis

Identifies footgun APIs, dangerous defaults, and security-misuse designs that enable developer mistakes.

Ssickn33
0
security

Shodan Reconnaissance For Pentesting

Systematically discover exposed services, vulnerable systems, and IoT devices using Shodan's API, CLI, and search filters during authorized penetration testing.

Ssickn33
0
security

SMTP Penetration Testing

Conduct comprehensive SMTP server security assessments to identify vulnerabilities including open relays, user enumeration, weak authentication, and misconfigurations.

Ssickn33
0
security

Spec-to-Code Compliance Auditor

Verify blockchain code implements exact specification requirements by comparing against whitepapers and design documents with evidence-based gap analysis.

Ssickn33
0
security

SQL Injection Vulnerability Testing

Execute systematic SQL injection assessments to identify database vulnerabilities, extract schemas, and validate input sanitization across multiple attack vectors.

Ssickn33
0
security

Threat Modeling Expert

Apply STRIDE, PASTA, and attack trees to identify security threats and design mitigations for system architectures.

Ssickn33
0
security

Web Vulnerabilities Reference Guide

Reference 100+ critical web vulnerabilities organized by category with root causes, impacts, and specific mitigations for systematic security testing.

Ssickn33
0
security

Variant Analysis for Security

Find similar vulnerabilities across codebases using pattern-based analysis with ripgrep, Semgrep, and CodeQL after identifying an initial issue.

Ssickn33
0
security

Varlock Secrets Management

Protect sensitive environment variables in Claude Code sessions using secure-by-default masking and validation.

Ssickn33
0
security

AI Code Quality Auditor

Audit AI-generated or rapidly iterated code for structural flaws, security risks, and production readiness across seven dimensions.

Ssickn33
0
security

Windows Privilege Escalation Testing

Systematically enumerate Windows systems and exploit privilege escalation vulnerabilities during authorized penetration testing to achieve elevated access.

Ssickn33
0
security

CISO Advisor

Quantify security risks in dollars, build compliance roadmaps, and architect zero-trust strategies for growth companies.

AAlireza Rezvani
0
security

ISO 27001 ISMS Audit Expert

Execute ISO 27001 internal/external audits with risk-based scheduling, control assessment, nonconformity classification, and certification support workflows.

AAlireza Rezvani
0
security

API Route Compliance Auditor

Audit Next.js API routes against security patterns, catching auth drift, unsafe casts, missing validation, and org-scoping gaps.

PPhillip McGurk
0
security

GitHub Actions AI Security Auditor

Audit GitHub Actions workflows for security vulnerabilities in AI agent integrations by detecting attack vectors where attacker-controlled input reaches CI/CD-deployed agents.

Ssickn33
0