Extend your AI coding assistant with powerful skills. Works with Claude Code, Codex, Gemini CLI, Cursor — install in seconds.
998 skills found
Capture and analyze network traffic with Wireshark and tshark.
Run authorized red team social engineering assessments with the Social Engineer Toolkit (SET).
Run active web application reconnaissance with SkipFish.
Use Kali Linux for authorized penetration testing, security research, and CTF work.
Crack password hashes offline with John the Ripper.
Run online login brute-force and password spraying with THC Hydra.
Craft custom TCP/UDP/ICMP packets with hping3.
GPU-accelerated password hash recovery with hashcat.
Recover deleted files and carve artifacts from disk images and memory dumps with Foremost.
Audit Wi-Fi networks with the aircrack-ng suite.
Run Vision Language Models locally on Apple Silicon Macs using MLX.
Build multi-agent AI systems with Microsoft's Agent Framework (formerly Semantic Kernel Agents).
Use Block's Goose — an open-source, extensible AI agent that goes beyond code suggestions to...
Meta-skill for discovering and invoking the right agent skill for any task.
Forecast time series data using Google's TimesFM foundation model with zero-shot prediction.
Search for social media accounts by username across 400+ platforms using Sherlock.
Browse, search, and self-host a community prompt library with 1000+ curated prompts.
Deploy and configure Onyx, a self-hosted AI chat platform with RAG and 25+ data connectors.
Delivers changes incrementally in thin vertical slices.
Refines raw ideas into sharp, actionable concepts through structured divergent and convergent...
Records architectural decisions and documentation.
Use DESIGN.md files to give AI agents a complete design system in plain text. Drop a DESIGN.
Optimizes agent context setup for maximum output quality.
Simplifies code for clarity without changing behavior.
Prove (and disprove) firewall and network ACL rules in production by sending crafted TCP/UDP/ICMP packets with hping3, cross-checking reachability with Nmap, and confirming what actually traverses the wire with Wireshark. Catches misconfigured rules, asymmetric paths, and overly permissive allow-lists before the next auditor or attacker does.
Design, execute, and debrief a security awareness phishing simulation under a signed rules-of-engagement agreement — from pretext approval and landing page cloning to measuring click-through and report-to-security rates, rotating any submitted credentials, and pushing every targeted employee into a training module the same day.
Triage a suspicious packet capture during an incident response: identify the scope of a network intrusion, extract exfiltrated files and malware payloads, reconstruct the attacker timeline, and produce evidence for the incident report. Uses Wireshark/tshark for protocol analysis and Foremost for carving artifacts out of the capture.
Export password hashes from your own systems — Linux /etc/shadow, Active Directory NTDS.dit, application databases — and run a controlled offline cracking audit with John the Ripper and hashcat to identify weak passwords, measure the hash algorithm's real-world strength, and drive targeted password rotation or policy changes.
Test the real-world strength of your own home Wi-Fi passphrase end-to-end — capture a WPA2 handshake with aircrack-ng, crack it offline on a GPU with hashcat, inspect wireless traffic with Wireshark, and tighten the router configuration based on the findings. Strictly for networks you own.
Replace $200/month cloud API costs with free, offline vision AI on Apple Silicon using mlx-vlm for product photo processing.
One command to get started with Terminal Skills.
Browse the catalog or search for what you need.
Install any skill and start using it immediately.
Join developers using Terminal Skills with Claude Code, Codex, Gemini, and Cursor.