Total Skills
15
Skills published by 0x-professor with real stars/downloads and source-aware metadata.
Total Skills
15
Total Stars
0
Total Downloads
0
Comparison chart based on real stars and downloads signals from source data.
pentest-c2-operator
0
pentest-auth-bypass
0
pentest-api-attacker
0
pentest-active-directory
0
nmap-pentest-scans
0
ml-model-eval-benchmark
0
ml-experiment-tracker
0
docs-pipeline-automation
0
Set up authorized C2 simulation workflows and measure defensive detection outcomes.
Test authentication and session management controls for bypass and account takeover scenarios.
Test APIs against OWASP API Security Top 10 including discovery, auth abuse, and protocol-specific checks.
Assess Active Directory identity attack paths including roasting, relay, and delegation abuse.
Plan and orchestrate authorized Nmap host discovery, port and service enumeration, NSE profiling, and reporting artifacts for in-scope targets.
Compare model candidates using weighted metrics and deterministic ranking outputs. Use for benchmark leaderboards and model promotion decisions.
Plan reproducible ML experiment runs with explicit parameters, metrics, and artifacts. Use before model training to standardize tracking-ready experiment definitions.
Build repeatable data-to-Docs pipelines from Sheets and Drive sources. Use for automated status reports, template-based document assembly, and scheduled publishing workflows.
Build transformer fine-tuning run plans with task settings, hyperparameters, and model-card outputs. Use for repeatable Hugging Face or PyTorch finetuning workflows.
Design Gmail, Drive, Sheets, and Calendar automations with scope-aware plans. Use for repeatable daily task automation with explicit OAuth scopes and audit-ready outputs.
Map application security findings to OWASP Top 10 categories and generate remediation checklists. Use for normalized AppSec review outputs and category-level prioritization.
Prioritize vulnerability remediation using KEV-style exploitation context plus asset criticality. Use for CVE triage, patch order decisions, and remediation reporting.
Build incident response timelines and report packs from event logs. Use for detection-to-recovery reporting, phase tracking, and stakeholder-ready incident summaries.
Generate reusable multi-step agent workflow blueprints. Use for trigger/action orchestration, deterministic workflow definitions, and automation handoff artifacts.
Scaffold MCP server projects and baseline tool contract checks. Use for defining tool schemas, generating starter server layouts, and validating MCP-ready structure.