REST API server and MCP protocol integration
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →REST API server and MCP protocol integration
Chunking, embeddings, and RAG pipeline integration
Plugin architecture, registration, and trait patterns
Search topic or arXiv paper ID: $ARGUMENTS
Search query: $ARGUMENTS
Search and progressively read open-access academic papers through DeepXiv. Use when the user wants layered paper access, section-level reading, trending papers, or DeepXiv-backed literature retrieval.
End-to-end autonomous research workflow for: **$ARGUMENTS**
Refine and concretize: **$ARGUMENTS**
State-space model with O(n) complexity vs Transformers' O(n²). 5× faster inference, million-token sequences, no KV cache. Selective SSM with hardware-aware design. Mamba-1 (d_state=16) and Mamba-2 (d_state=128, multi-head). Models 130M-2.8B on HuggingFace.
RNN+Transformer hybrid with O(n) inference. Linear time, infinite context, no KV cache. Train like GPT (parallel), infer like RNN (sequential). Linux Foundation AI project. Production at Windows, Office, NeMo. RWKV-7 (March 2025). Models up to 14B parameters.
Fine-tune LLMs using reinforcement learning with TRL - SFT for instruction tuning, DPO for preference alignment, PPO/GRPO for reward optimization, and reward model training. Use when need RLHF, align model with preferences, or train from human feedback. Works with HuggingFace Transformers.
Trains large language models (2B-462B parameters) using NVIDIA Megatron-Core with advanced parallelism strategies. Use when training models >1B parameters, need maximum GPU efficiency (47% MFU on H100), or require tensor/pipeline/sequence/context/expert parallelism. Production-ready framework used for Nemotron, LLaMA, DeepSeek.
Serverless GPU cloud platform for running ML workloads. Use when you need on-demand GPU access without infrastructure management, deploying ML models as APIs, or running batch jobs with automatic scaling.
Perform static analysis of Android APK malware samples using apktool for decompilation, jadx for Java source
Analyze Chromium-based browser artifacts using Hindsight to extract browsing history, downloads, cookies, cached
'Analyzes malicious VBA macros embedded in Microsoft Office documents (Word, Excel, PowerPoint) to identify download
Perform static analysis of malicious PDF documents using peepdf, pdfid, and pdf-parser to extract embedded JavaScript,
Use Sysinternals Autoruns to systematically identify and analyze malware persistence mechanisms across registry
'Identifies and unpacks UPX-packed and other packed malware samples to expose the original executable code for
Monitor and analyze ransomware group data leak sites (DLS) to track victim postings, extract threat intelligence
Identify ransomware network indicators including C2 beaconing patterns, TOR exit node connections, data exfiltration
Investigate supply chain attack artifacts including trojanized software updates, compromised build pipelines,
'Parses and analyzes the Windows Amcache.hve registry hive to extract evidence of program execution, application
Parse Windows Prefetch files using the windowsprefetch Python library to reconstruct application execution history,
Extract and analyze Windows Registry hives to uncover user activity, installed software, autostart entries, and
'Automates the enrichment of raw indicators of compromise with multi-source threat intelligence context using
Extract and catalog attack patterns from cyber threat intelligence reports into a structured STIX-based library
'Builds an automated malware submission and analysis pipeline that collects suspicious files from endpoints and
Build an automated pipeline to defang indicators of compromise (URLs, IPs, domains, emails) for safe sharing
OpenCTI is an open-source platform for managing cyber threat intelligence knowledge, built on STIX 2.1 as its
Build a systematic threat hunt hypothesis framework that transforms threat intelligence, attack patterns, and
Build automated threat intelligence enrichment pipelines in Splunk Enterprise Security using lookup tables, modular
'Responds to phishing incidents by analyzing reported emails, extracting indicators, assessing credential compromise,
Configure microsegmentation policies to enforce least-privilege workload-to-workload access using tools like
'Deobfuscates malicious JavaScript code used in web-based attacks, phishing pages, and dropper scripts by reversing
'Detects prompt injection attacks targeting LLM-based applications using a multi-layered defense combining regex
'Detecting exposed AWS credentials in source code repositories, CI/CD pipelines, and configuration files using
Detect AWS IAM privilege escalation paths using boto3 and Cloudsplaining policy analysis to identify overly permissive
Detect DLL side-loading attacks where adversaries place malicious DLLs alongside legitimate applications to hijack
Detect data exfiltration through DNS tunneling by analyzing query entropy, subdomain length, query volume, TXT
Detect Golden Ticket attacks in Active Directory by analyzing Kerberos TGT anomalies including mismatched encryption
'Detects insider data exfiltration by analyzing DLP policy violations, file access patterns, upload volume anomalies,
Detect insider threat behavioral indicators including unusual data access, off-hours activity, mass file downloads,
'Scans GitHub Actions workflows and CI/CD pipeline configurations for supply chain attack vectors including unpinned
Detect suspicious PowerShell execution patterns including encoded commands, download cradles, AMSI bypass attempts,
Perform Kerberoasting attacks using Impacket's GetUserSPNs to extract and crack Kerberos TGS tickets for Active
Extract and analyze browser history, cookies, cache, downloads, and bookmarks from Chrome, Firefox, and Edge
Extract embedded configuration from Agent Tesla RAT samples including SMTP/FTP/Telegram exfiltration credentials,
'Extracts indicators of compromise (IOCs) from malware samples including file hashes, network indicators (IPs,
Extract, parse, and analyze Windows Event Logs (EVTX) using Chainsaw, Hayabusa, and EvtxECmd to detect lateral