
from trending-skills42
Describes a Go implementation of a Linux local privilege escalation exploit (CVE-2026-31431). Contains exploit details and build/usage instructions.
This SKILL documents a Go-based exploit (CopyFail) for a Linux kernel vulnerability (CVE-2026-31431). The content explains the vulnerability window, how the PoC binary operates, build instructions, and verification and restore procedures. It is a technical writeup intended for security researchers, incident responders or maintainers assessing affected systems.
Use only when assessing or patching systems you own or are authorized to test. It is appropriate for legitimate vulnerability research, defensive analysis, and patch verification. It must NOT be used for unauthorized exploitation.
{}
This skill has not been reviewed by our automated audit pipeline yet.
OpenClaude — Multi-LLM Shim
Routes Claude Code tool calls through an OpenAI-compatible shim so Claude Code can use GPT-4o, Gemini, Ollama and other OpenAI-style models while preserving too
OpenMAIC — Interactive Multi-Agent Classroom
Generate interactive AI-powered lessons (slides, quizzes, simulations) from any topic or document using a multi-agent pipeline and TTS-enabled agents.
Fabro Workflow Factory
Orchestrate multi-step AI coding workflows as Graphviz DOT graphs with human approval gates, multi-model routing, and cloud sandboxes.
Capso Screenshot & Screen Recording
Expert guide to Capso: building from source, SPM package architecture, using CaptureKit/AnnotationKit/OCRKit, and contributing to the macOS screenshot/recording