AAWEA.ORG
AAWEA.ORG
AAWEA.ORG
AAWEA AI Skills Hub · One-Click AI Workflows

Your AI Toolkit.
Ready to Use.

🧩
What is an AI Skill?
A Skill is a pre-built AI workflow — you just fill in your details and get a professional output in seconds. No coding, no setup, no AI expertise needed.
1424+
AI Skills
75
Categories
1-Click
To Use
Free
To Try

How It Works — 3 Steps

🔍
1
Find a Skill
Browse by category or search for what you need. Each skill shows exactly what it produces.
✏️
2
Fill in Your Details
Answer a few simple questions about your business, goal, or topic. No tech knowledge needed.
3
Get Your Result
Receive a professional AI-generated output — copy it, download it, or use it directly in your work.

security Skills

← All Skills
Security Compliance Compliance Check 🤖
Security Compliance Compliance Check
Community
security

You are a compliance expert specializing in regulatory requirements for software systems including GDPR, HIPAA, SOC2, PCI-DSS, and other industry standards. Perform comprehensive compliance audits and provide implementation guidance for achieving and maintaining compliance.

Binary Analysis Patterns 🤖
Binary Analysis Patterns
Community
security

Comprehensive patterns and techniques for analyzing compiled binaries, understanding assembly code, and reconstructing program logic.

Scanning Tools 🤖
Scanning Tools
Community
security

Master essential security scanning tools for network discovery, vulnerability assessment, web application testing, wireless security, and compliance validation. This skill covers tool selection, configuration, and practical usage across different scanning categories.

Varlock 🤖
Varlock
Community
security

Secure-by-default environment variable management for Claude Code sessions.

Ffuf Web Fuzzing 🤖
Ffuf Web Fuzzing
Community
security

Expert guidance for ffuf web fuzzing during penetration testing, including authenticated fuzzing with raw requests, auto-calibration, and result analysis

007 🤖
007
Community
security

Security audit, hardening, threat modeling (STRIDE/PASTA), Red/Blue Team, OWASP checks, code review, incident response, and infrastructure security for any project.

Varlock Claude Skill 🤖
Varlock Claude Skill
Community
security

Secure environment variable management ensuring secrets are never exposed in Claude sessions, terminals, logs, or git commits

Threat Mitigation Mapping 🤖
Threat Mitigation Mapping
Community
security

Map identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.

Burpsuite Project Parser 🤖
Burpsuite Project Parser
Community
security

Searches and explores Burp Suite project files (.burp) from the command line. Use when searching response headers or bodies with regex patterns, extracting security audit findings, dumping proxy history or site map data, or analyzing HTTP traffic captured in a Burp project.

Frontend Security Coder 🤖
Frontend Security Coder
Community
security

Expert in secure frontend coding practices specializing in XSS prevention, output sanitization, and client-side security patterns.

Firmware Analyst 🤖
Firmware Analyst
Community
security

Expert firmware analyst specializing in embedded systems, IoT security, and hardware reverse engineering.

Top Web Vulnerabilities 🤖
Top Web Vulnerabilities
Community
security

Provide a comprehensive, structured reference for the 100 most critical web application vulnerabilities organized by category. This skill enables systematic vulnerability identification, impact assessment, and remediation guidance across the full spectrum of web security threats.

Zeroize Audit 🤖
Zeroize Audit
Community
security

Detects missing zeroization of sensitive data in source code and identifies zeroization removed by compiler optimizations, with assembly-level analysis, and control-flow verification. Use for auditing C/C++/Rust code handling secrets, keys, passwords, or other sensitive data.

File Uploads 🤖
File Uploads
Community
security

Expert at handling file uploads and cloud storage. Covers S3, Cloudflare R2, presigned URLs, multipart uploads, and image optimization. Knows how to handle large files without blocking.

Protocol Reverse Engineering 🤖
Protocol Reverse Engineering
Community
security

Comprehensive techniques for capturing, analyzing, and documenting network protocols for security research, interoperability, and debugging.

Broken Authentication 🤖
Broken Authentication
Community
security

Identify and exploit authentication and session management vulnerabilities in web applications. Broken authentication consistently ranks in the OWASP Top 10 and can lead to account takeover, identity theft, and unauthorized access to sensitive systems.

Laravel Security Audit 🤖
Laravel Security Audit
Community
security

Security auditor for Laravel applications. Analyzes code for vulnerabilities, misconfigurations, and insecure practices using OWASP standards and Laravel security best practices.

Security Bluebook Builder 🤖
Security Bluebook Builder
Community
security

Build a minimal but real security policy for sensitive apps. The output is a single, coherent Blue Book document using MUST/SHOULD/CAN language, with explicit assumptions, scope, and security gates.

Threat Modeling Expert 🤖
Threat Modeling Expert
Community
security

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use PROACTIVELY for security architecture reviews, threat identification, or building secure-by-design systems.

Ffuf Claude Skill 🤖
Ffuf Claude Skill
Community
security

Web fuzzing with ffuf

Malware Analyst 🤖
Malware Analyst
Community
security

Expert malware analyst specializing in defensive malware research, threat intelligence, and incident response. Masters sandbox analysis, behavioral analysis, and malware family identification.

Memory Forensics 🤖
Memory Forensics
Community
security

Comprehensive techniques for acquiring, analyzing, and extracting artifacts from memory dumps for incident response and malware analysis.

Secrets Management 🤖
Secrets Management
Community
security

Secure secrets management practices for CI/CD pipelines using Vault, AWS Secrets Manager, and other tools.

Sast Configuration 🤖
Sast Configuration
Community
security

Static Application Security Testing (SAST) tool setup, configuration, and custom rule creation for comprehensive security scanning across multiple programming languages.

🤖

Not sure where to start?

Tell us your goal and our AI will recommend the perfect skill for you — no browsing required.
🎯 Find My Perfect Skill →