🔒Security
30,440
2,193

memory-forensics

Master memory forensics techniques including memory acquisition, process analysis, and artifact extraction using Volatility and related tools. Use when analyzing memory dumps, investigating incidents, or performing malware analysis from RAM captures.

#analysis#security-audit#binary-analysis#memory
Share
Quick Install
>_npx skills add wshobson/agents
Documentation
Loading documentation...
Repository
Repositorywshobson/agents
Stars30,440
Last UpdatedFeb 21, 2026
Related Skills
6,168
26

authentication-setup

Setup and manage authentication and authorization systems including JWT, OAuth, and role-based access control.

supercent-io
supercent-io/skills-template
6,013
23,974

azure-role-selector

Helps users select appropriate Azure roles based on required permissions with least privilege access.

github
github/awesome-copilot
5,028
26

security-best-practices

Implement security best practices for web apps and infrastructure, covering HTTPS, CORS, XSS, SQL injection, CSRF, rate limiting, and OWASP

supercent-io
supercent-io/skills-template
3,994
30,440

security-requirement-extraction

Extract security requirements from threat models and business context for actionable security measures.

wshobson
wshobson/agents
2,915
30,440

auth-implementation-patterns

Implement authentication and authorization patterns like JWT, OAuth2, session management, and RBAC for secure API access.

wshobson
wshobson/agents