Ultimate resource for extending Claude Code with custom skills, specialized agents, slash commands, and professional utilities
Last Updated: October 28, 2025 | Author: Alireza Rezvani | License: MIT
Ultimate resource for extending Claude Code with custom skills, specialized agents, slash commands, and professional utilities
Last Updated: October 28, 2025 | Author: Alireza Rezvani | License: MIT
| .markdown-here-wrapper { | |
| font-size: 16px; | |
| line-height: 1.8em; | |
| letter-spacing: 0.1em; | |
| } | |
| pre, code { | |
| font-size: 14px; | |
| font-family: Roboto, 'Courier New', Consolas, Inconsolata, Courier, monospace; |
Docker provides download links in release note. They promised that
(we) will also include download links in release notes for future releases.
Note:
| <div aria-live="polite" aria-atomic="true" x-data="{ | |
| toasts: [], | |
| remove(id) { | |
| {{-- this.toasts.splice(this.toasts.indexOf(toast), 1) --}} | |
| this.toasts = this.toasts.filter(t => t.id !== id) | |
| }, | |
| listen() { | |
| let toast = event.detail; | |
| let toast_id = (Math.random() + 1).toString(36).substring(7); | |
| this.toasts.push({ |
XXX following for the popup with the users you're following to appear(async function(){
const UNFOLLOW_LIMIT = 800
const delay = (ms) => new Promise(_ => setTimeout(_, ms))
const findButton = (txt) => [...document.querySelectorAll("button").entries()].map(([pos, btn]) => btn).filter(btn => btn.innerHTML === txt)[0]aws:CurrentTime —To check for date/time conditions.aws:EpochTime —To check for date/time conditions using a date in epoch or UNIX time.aws:TokenIssueTime This is the date and time that temporary security credentials were issued and can be used with date/time conditions. (Note: This key is only available in requests that are signed using temporary security credentials. For more information about temporary security credentials, see Temporary Security Credentials.)aws:principaltype —To check the type of principal (user, account, federated user, - etc.) for the current request.aws:SecureTransport —To check whether the request was sent using SSL. For services - that use only SSL, such as Amazon RDS and Amazon Route 53, the aws:SecureTransport - key has no meaning.aws:SourceArn —To check the source of the request, using the AmLatest News: http://site.api.espn.com/apis/site/v2/sports/football/college-football/news
Latest Scores: http://site.api.espn.com/apis/site/v2/sports/football/college-football/scoreboard
As a security professional, it is important to conduct a thorough reconnaissance. With the increasing use of APIs nowadays, it has become paramount to keep access tokens and other API-related secrets secure in order to prevent leaks. However, despite technological advances, human error remains a factor, and many developers still unknowingly hardcode their API secrets into source code and commit them to public repositories. GitHub, being a widely popular platform for public code repositories, may inadvertently host such leaked secrets. To help identify these vulnerabilities, I have created a comprehensive search list using powerful search syntax that enables the search of thousands of leaked keys and secrets in a single search.
(path:*.{File_extension1} OR path:*.{File_extension-N}) AND ({Keyname1} OR {Keyname-N}) AND (({Signature/pattern1} OR {Signature/pattern-N}) AND ({PlatformTag1} OR {PlatformTag-N}))
**1.