ai-factory
ai-factory is a skill that facilitates the setup and configuration of Claude Code for AI agent projects, including analyzing tech stacks and generating custom skills.
Browse and install thousands of AI Agent skills in the Killer-Skills directory. Supports Claude Code, Windsurf, Cursor, and more.
ai-factory is a skill that facilitates the setup and configuration of Claude Code for AI agent projects, including analyzing tech stacks and generating custom skills.
Release is a skill that enables governed AI workspaces by enforcing quality gates, security scanning, and risk management via git hooks, compatible with AI agents like Claude Code and GitHub Copilot.
Apply modern web development best practices for security, compatibility, and code quality. Use when asked to apply best practices, security audit, modernize code, code quality review, or check for vulnerabilities.
A complete security skill suite for OpenClaw's family of agents. Protect your SOUL.md (etc') with drift detection, live security recommendations, automated audits, and skill integrity verification. All from one installable suite.
Backend-engineer is a skill that specializes in API design, data modeling, security, and scalability, utilizing a technology stack including Java, Spring Boot, and PostgreSQL.
ufw is a command-line interface for managing firewall rules, providing an easy-to-use syntax for allowing or denying network traffic based on IP addresses, ports, and protocols.
correlate-ioc is a skill that correlates SIEM alerts with Indicators of Compromise (IOCs) to identify potential security threats
CyberStrikeAI is an AI-native security testing platform built in Go. It integrates 100+ security tools, an intelligent orchestration engine, role-based testing with predefined security roles, a skills system with specialized testing skills, and comprehensive lifecycle management capabilities.
Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we configure the agent for adversarial thinking, and perform research or attack/defense operations.