Author Profile: 0x-professor

Skills published by 0x-professor with real stars/downloads and source-aware metadata.

Total Skills

15

Total Stars

0

Total Downloads

0

RSS Feed

Skills Performance

Comparison chart based on real stars and downloads signals from source data.

pentest-c2-operator

0

Stars
0
Downloads
0

pentest-auth-bypass

0

Stars
0
Downloads
0

pentest-api-attacker

0

Stars
0
Downloads
0

pentest-active-directory

0

Stars
0
Downloads
0

nmap-pentest-scans

0

Stars
0
Downloads
0

ml-model-eval-benchmark

0

Stars
0
Downloads
0

ml-experiment-tracker

0

Stars
0
Downloads
0

docs-pipeline-automation

0

Stars
0
Downloads
0

Published Skills

Automation

pentest-c2-operator

Set up authorized C2 simulation workflows and measure defensive detection outcomes.

Archived Source
General

pentest-auth-bypass

Test authentication and session management controls for bypass and account takeover scenarios.

Archived Source
Security

pentest-api-attacker

Test APIs against OWASP API Security Top 10 including discovery, auth abuse, and protocol-specific checks.

Archived Source
General

pentest-active-directory

Assess Active Directory identity attack paths including roasting, relay, and delegation abuse.

Archived Source
General

nmap-pentest-scans

Plan and orchestrate authorized Nmap host discovery, port and service enumeration, NSE profiling, and reporting artifacts for in-scope targets.

Archived Source
General

ml-model-eval-benchmark

Compare model candidates using weighted metrics and deterministic ranking outputs. Use for benchmark leaderboards and model promotion decisions.

Archived Source
Web3

ml-experiment-tracker

Plan reproducible ML experiment runs with explicit parameters, metrics, and artifacts. Use before model training to standardize tracking-ready experiment definitions.

Archived Source
Automation

docs-pipeline-automation

Build repeatable data-to-Docs pipelines from Sheets and Drive sources. Use for automated status reports, template-based document assembly, and scheduled publishing workflows.

Archived Source
Automation

dl-transformer-finetune

Build transformer fine-tuning run plans with task settings, hyperparameters, and model-card outputs. Use for repeatable Hugging Face or PyTorch finetuning workflows.

Archived Source
Security

google-workspace-automation

Design Gmail, Drive, Sheets, and Calendar automations with scope-aware plans. Use for repeatable daily task automation with explicit OAuth scopes and audit-ready outputs.

Archived Source
Security

cyber-owasp-review

Map application security findings to OWASP Top 10 categories and generate remediation checklists. Use for normalized AppSec review outputs and category-level prioritization.

Archived Source
Security

cyber-kev-triage

Prioritize vulnerability remediation using KEV-style exploitation context plus asset criticality. Use for CVE triage, patch order decisions, and remediation reporting.

Archived Source
General

cyber-ir-playbook

Build incident response timelines and report packs from event logs. Use for detection-to-recovery reporting, phase tracking, and stakeholder-ready incident summaries.

Archived Source
Web3

agentic-workflow-automation

Generate reusable multi-step agent workflow blueprints. Use for trigger/action orchestration, deterministic workflow definitions, and automation handoff artifacts.

Archived Source
Web3

agentic-mcp-server-builder

Scaffold MCP server projects and baseline tool contract checks. Use for defining tool schemas, generating starter server layouts, and validating MCP-ready structure.

Archived Source
Author 0x-professor | V50.AI