jpropato/siba
Skill
Installs
dokploy-deploy
46
bauman-design-system
13
react-best-practices
11
skill-architect
11
ui-ux-pro-max
10
frontend-design
9
frontend-dev-guidelines
9
react-ui-patterns
9
theme-factory
9
file-organizer
9
core-components
9
github-workflow-automation
8
backend-dev-guidelines
8
subagent-driven-development
8
loki-mode
8
finishing-a-development-branch
8
linux production shell scripts
8
top 100 web vulnerabilities reference
8
writing-plans
8
senior-fullstack
8
sqlmap database penetration testing
8
api fuzzing for bug bounty
8
sql injection testing
8
brand-guidelines
8
workflow-automation
8
brainstorming
8
pentest checklist
8
receiving-code-review
8
software-architecture
8
canvas-design
8
git-pushing
8
systematic-debugging
8
skill-creator
8
javascript-mastery
8
playwright-skill
8
smtp penetration testing
8
executing-plans
8
address-github-comments
8
docx
8
skill-developer
8
d3-viz
8
active directory attacks
8
app-store-optimization
8
doc-coauthoring
8
7
testing-patterns
7
claude code guide
7
using-git-worktrees
7
network 101
7
kaizen
7
notebooklm
7
aws penetration testing
7
prompt-library
7
using-superpowers
7
llm-app-patterns
7
test-fixing
7
requesting-code-review
7
security scanning tools
7
xlsx
7
pptx
7
algorithmic-art
7
html injection testing
7
writing-skills
7
product-manager-toolkit
7
planning-with-files
7
senior-architect
7
metasploit framework
7
web-artifacts-builder
7
test-driven-development
7
pentest commands
7
prompt-engineering
7
slack-gif-creator
7
bun-development
7
file path traversal testing
7
idor vulnerability testing
7
ethical hacking methodology
7
web-design-guidelines
7
windows privilege escalation
7
red team tools and methodology
7
concise-planning
7
broken authentication testing
7
burp suite web application testing
7
wordpress penetration testing
7
privilege escalation methods
7
cross-site scripting and html injection testing
7
mcp-builder
7
internal-comms
7
verification-before-completion
7
cloud penetration testing
7
content-creator
7
dispatching-parallel-agents
7
linux privilege escalation
7
autonomous-agent-patterns
7
shodan reconnaissance and pentesting
7
wireshark network traffic analysis
7
webapp-testing
7
ssh penetration testing
7