New skills
Browse the most recently seen skills in the imported catalog, with a stable tiebreak on current popularity.
consumption-tax
by kazukinagata/shinkoku
課税売上・課税仕入から消費税額を計算するスキル。 assess スキルで消費税の課税事業者と判定され、settlement スキルで決算が完了していることを前提とする。 計算結果は /e-tax スキル(Claude in Chrome)で確定申告書等作成コーナーに入力する。
incorporation
by kazukinagata/shinkoku
個人事業主から法人への移行(法人成り)に関する包括的な知識ベース。 税額比較シミュレーション、法人形態の選択、設立手続き、役員報酬戦略を支援する。
reading-withholding
by kazukinagata/shinkoku
Source details, install context, and public review data are available on the full page.
intent-framed-agent
by pskoett/pskoett-ai-skills
This skill turns implicit intent into an explicit, trackable artifact at the moment execution starts. It creates a lightweight intent contract, watches for scope drift while work is in progress, and closes each intent with a short resolution record.
clawdbot-backup
by sundial-org/awesome-openclaw-skills
Backup, restore, and sync your ClawdBot configuration across devices directly from Clawdbot.
atxp-memory
by atxp-dev/cli
Manage your agent's .md memory files: back up and restore to/from ATXP cloud servers, and search your local memories using zvec vector similarity search.
text-optimizer
by kochetkov-ma/claude-brewcode
Source details, install context, and public review data are available on the full page.
design-taste-frontend
by leonxlnx/taste-skill
AI Instruction: The standard baseline for all generations is strictly set to these values (8, 6, 4). Do not ask the user to edit this file. Otherwise, ALWAYS listen to the user: adapt these values dynamically based on what they explicitly request in their chat prompts. Use these baseline (or user-overridden) values as...
wechat-article-extractor
by freestylefly/wechat-article-extractor-skill
Extract metadata and content from WeChat Official Account (微信公众号) articles.
abund-ai
by abund-ai/abund.ai
The first social network built exclusively for AI agents.
agent-teams-simplify-and-harden
by pskoett/pskoett-ai-skills
A two-phase team loop that produces production-quality code: implement , then audit using simplify + harden passes , then fix audit findings , then re-audit , repeating until the codebase is solid or the loop cap is reached.
simplify-and-harden
by pskoett/pskoett-ai-skills
Source details, install context, and public review data are available on the full page.
pentest-checklist
by sickn33/antigravity-awesome-skills
Provide a comprehensive checklist for planning, executing, and following up on penetration tests. Ensure thorough preparation, proper scoping, and effective remediation of discovered vulnerabilities.
ethical-hacking-methodology
by sickn33/antigravity-awesome-skills
Master the complete penetration testing lifecycle from reconnaissance through reporting. This skill covers the five stages of ethical hacking methodology, essential tools, attack techniques, and professional reporting for authorized security assessments.
pentest-commands
by sickn33/antigravity-awesome-skills
Provide a comprehensive command reference for penetration testing tools including network scanning, exploitation, password cracking, and web application testing. Enable quick command lookup during security assessments.
sql-injection-testing
by sickn33/antigravity-awesome-skills
Execute comprehensive SQL injection vulnerability assessments on web applications to identify database security flaws, demonstrate exploitation techniques, and validate input sanitization mechanisms. This skill enables systematic detection and exploitation of SQL injection vulnerabilities across in-band, blind, and...
aws-penetration-testing
by sickn33/antigravity-awesome-skills
Provide comprehensive techniques for penetration testing AWS cloud environments. Covers IAM enumeration, privilege escalation, SSRF to metadata endpoint, S3 bucket exploitation, Lambda code extraction, and persistence techniques for red team operations.
wordpress-penetration-testing
by sickn33/antigravity-awesome-skills
Conduct comprehensive security assessments of WordPress installations including enumeration of users, themes, and plugins, vulnerability scanning, credential attacks, and exploitation techniques. WordPress powers approximately 35% of websites, making it a critical target for security testing.
cloud-penetration-testing
by sickn33/antigravity-awesome-skills
Conduct comprehensive security assessments of cloud infrastructure across Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP). This skill covers reconnaissance, authentication testing, resource enumeration, privilege escalation, data extraction, and persistence techniques for authorized cloud...
linux-privilege-escalation
by sickn33/antigravity-awesome-skills
Execute systematic privilege escalation assessments on Linux systems to identify and exploit misconfigurations, vulnerable services, and security weaknesses that allow elevation from low-privilege user access to root-level control. This skill enables comprehensive enumeration and exploitation of kernel...
active-directory-attacks
by sickn33/antigravity-awesome-skills
Provide comprehensive techniques for attacking Microsoft Active Directory environments. Covers reconnaissance, credential harvesting, Kerberos attacks, lateral movement, privilege escalation, and domain dominance for red team operations and penetration testing.
metasploit-framework
by sickn33/antigravity-awesome-skills
⚠️ AUTHORIZED USE ONLY This skill is for educational purposes or authorized security assessments only. You must have explicit, written permission from the system owner before using this tool. Misuse of this tool is illegal and strictly prohibited.
smtp-penetration-testing
by sickn33/antigravity-awesome-skills
Conduct comprehensive security assessments of SMTP (Simple Mail Transfer Protocol) servers to identify vulnerabilities including open relays, user enumeration, weak authentication, and misconfiguration. This skill covers banner grabbing, user enumeration techniques, relay testing, brute force attacks, and security...
windows-privilege-escalation
by sickn33/antigravity-awesome-skills
Provide systematic methodologies for discovering and exploiting privilege escalation vulnerabilities on Windows systems during penetration testing engagements. This skill covers system enumeration, credential harvesting, service exploitation, token impersonation, kernel exploits, and various misconfigurations that...