
from "affaan-m/everything-claude-code"
Fact-forcing gate that blocks Edit/Write/Bash including MultiEdit and demands concrete investigation importers, data schemas, user instruction before allowing the action. Measurably...
General-purpose tools and utilities for developers and power users.

from "affaan-m/everything-claude-code"
Fact-forcing gate that blocks Edit/Write/Bash including MultiEdit and demands concrete investigation importers, data schemas, user instruction before allowing the action. Measurably...

from "anthropics/skills"
Guide for creating high-quality MCP Model Context Protocol servers that enable LLMs to interact with external services through well-designed tools. Use when building MCP servers to...

from "github/awesome-copilot"
Process and manipulate images using ImageMagick. Supports resizing, format conversion, batch processing, and retrieving image metadata. Use when working with images, creating thumbnails,...

from "github/awesome-copilot"
Triage and resolve Fedora issues with dnf, systemd, and SELinux-aware guidance.

from "github/awesome-copilot"
Triage and resolve Debian Linux issues with apt, systemd, and AppArmor-aware guidance.

from "github/awesome-copilot"
Triage and resolve CentOS issues using RHEL-compatible tooling, SELinux-aware practices, and firewalld.

from "github/awesome-copilot"
Triage and resolve Arch Linux issues with pacman, systemd, and rolling-release best practices.

from "K-Dense-AI/scientific-agent-skills"
Core skill for the deep research and writing tool. Write scientific manuscripts in full paragraphs never bullet points . Use two-stage process with 1 section outlines with key points using...

from "muratcankoylan/Agent-Skills-for-Context-Engineering"
This skill should be used when the user asks to "offload context to files", "implement dynamic context discovery", "use filesystem for agent memory", "reduce context window bloat", or...

from "mukul975/Anthropic-Cybersecurity-Skills"
Linux privilege escalation involves elevating from a low-privilege user account to root access on a compromised

from "mukul975/Anthropic-Cybersecurity-Skills"
Performs privilege escalation assessments on compromised Linux and Windows systems to identify paths from low-privilege

from "mukul975/Anthropic-Cybersecurity-Skills"
Perform forensic investigation of Linux system logs including syslog, auth.log, systemd journal, kern.log, and

from "mukul975/Anthropic-Cybersecurity-Skills"
Configures mutual TLS mTLS authentication between microservices using Python cryptography library for certificate

from "mukul975/Anthropic-Cybersecurity-Skills"
Detect suspicious Windows service installations MITRE ATT&CK T1543.003 by parsing System event logs for Event

from "mukul975/Anthropic-Cybersecurity-Skills"
Detect WMI-based lateral movement by analyzing Windows Event ID 4688 process creation and Sysmon Event ID 1 for

from "mukul975/Anthropic-Cybersecurity-Skills"
Detect process hollowing T1055.012 by analyzing memory-mapped sections, hollowed process indicators, and parent-child

from "mukul975/Anthropic-Cybersecurity-Skills"
Detect abuse of legitimate Windows binaries LOLBins used for living off the land attacks. Monitors process

from "mukul975/Anthropic-Cybersecurity-Skills"
Builds comprehensive identity governance and lifecycle management processes including joiner-mover-leaver automation,

from "mukul975/Anthropic-Cybersecurity-Skills"
Detect and analyze Linux persistence mechanisms including crontab entries, systemd service units, LD PRELOAD

from "mukul975/Anthropic-Cybersecurity-Skills"
Performs Linux memory acquisition using LiME Linux Memory Extractor kernel module and analysis with Volatility

from "mukul975/Anthropic-Cybersecurity-Skills"
Detect kernel-level rootkits in Linux memory dumps using Volatility3 linux plugins check syscall, lsmod, hidden modules ,

from "mukul975/Anthropic-Cybersecurity-Skills"
Examine Linux system artifacts including auth logs, cron jobs, shell history, and system configuration to uncover

from "mukul975/Anthropic-Cybersecurity-Skills"
Analyzes malicious Linux ELF Executable and Linkable Format binaries including botnets, cryptominers, ransomware,

from "mukul975/Anthropic-Cybersecurity-Skills"
Analyze Windows LNK shortcut files and Jump List artifacts to establish evidence of file access, program execution,