Trail of Bits Claude Code skills for security research, vulnerability detection, and audit workflows
☆3,153Mar 4, 2026Updated this week
Alternatives and similar repositories for skills
Users that are interested in skills are comparing it to the libraries listed below
Sorting:
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆76Updated this week
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Solidity/EVM smart contract security auditor — 104 vulnerability patterns, 8 tools, 100% CTF + EVMBench benchmark (120/120)☆78Mar 2, 2026Updated last week
- Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents,…☆1,442Updated this week
- A prompt-based pipeline for finding, validating, and proving vulnerabilities using LLM sub-agents.☆41Feb 22, 2026Updated 2 weeks ago
- Opinionated defaults, documentation, and workflows for Claude Code at Trail of Bits☆1,485Feb 25, 2026Updated last week
- Adobe Experience Manager (AEM) hacking toolkit☆107Sep 26, 2025Updated 5 months ago
- SAST + LLM Interprocedural Context Extractor☆189Oct 28, 2025Updated 4 months ago
- Curated, community-vetted Claude Code plugin marketplace☆245Feb 23, 2026Updated 2 weeks ago
- A symbolic testing tool for EVM smart contracts☆976Aug 6, 2025Updated 7 months ago
- Automatic Exploit Generation with LLMs☆572Jan 30, 2026Updated last month
- AI-powered workflow automation and AI Agents platform for AppSec, Fuzzing & Offensive Security. Automate vulnerability discovery with int…☆758Updated this week
- Public Source code Release of Theori's AIxCC AFC Submission☆241Aug 5, 2025Updated 7 months ago
- Sandboxed devcontainer for running Claude Code in bypass mode safely. Built for security audits and untrusted code review.☆493Updated this week
- the LLM vulnerability scanner☆7,164Updated this week
- A CLI tool for managing DigitalOcean droplets with automated setup, SSH configuration, and lifecycle management.☆82Feb 25, 2026Updated last week
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Jul 18, 2024Updated last year
- Zero shot vulnerability discovery using LLMs☆2,511Feb 6, 2025Updated last year
- Buttercup finds and patches software vulnerabilities☆1,520Mar 3, 2026Updated last week
- curation of all(most) immunefi bug bounty writeups I could find(till now)☆1,112Jan 21, 2026Updated last month
- Blog/Journal on how to backdoor VSCode extensions☆77Feb 24, 2026Updated last week
- Persistent semantic memory system for Claude Code☆73Jan 29, 2026Updated last month
- The fastest way to understand complex Solidity smart contracts.☆147Mar 2, 2026Updated last week
- Reproduce DeFi hacked incidents using Foundry.☆6,443Feb 18, 2026Updated 2 weeks ago
- Guidelines and training material to write secure smart contracts☆2,460Updated this week
- Optimized Solidity snippets.☆3,279Dec 30, 2025Updated 2 months ago
- A collection of skills for AI coding agents from Semgrep☆136Mar 2, 2026Updated last week
- Cybersecurity AI (CAI), the framework for AI Security☆7,349Jan 30, 2026Updated last month
- Security gateway for AI agents - credential-isolated API proxying and policy-gated remote execution (conclaves). Reduce the blast radius!☆109Feb 27, 2026Updated last week
- Static Analyzer for Solidity and Vyper☆6,158Updated this week
- Open-source code analysis platform for C/C++/Java/Binary/Javascript/Python/Kotlin based on code property graphs. Discord https://discord.…☆2,972Updated this week
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 9 months ago
- Semgrep queries developed by Trail of Bits.☆484Nov 12, 2025Updated 3 months ago
- Official Claude Code compound engineering plugin☆10,095Updated this week
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆267Sep 16, 2025Updated 5 months ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,115Updated this week
- Abuse trust-boundaries to bypass firewalls and network controls☆391Jul 24, 2025Updated 7 months ago
- prediction market indexer with semantic search☆35Jan 27, 2026Updated last month