web-scraping
π―Skillfrom dnyoussef/context-cascade
Extracts structured data from websites using configurable selectors, handling dynamic content and providing clean, parseable output for data analysis.
Part of
dnyoussef/context-cascade(33 items)
Installation
/plugin marketplace add DNYoussef/context-cascade/plugin install 12fa-core/plugin install 12fa-core 12fa-three-loop 12fa-security 12fa-visual-docs 12fa-swarmnpm install -g claude-flow@alphaclaude mcp add claude-flow npx claude-flow@alpha mcp start+ 5 more commands
{
"mcpServers": {
"connascence-analyzer": {
"command": "python",
...More from this repository10
Automates firmware disassembly, binary analysis, and vulnerability detection for embedded systems and IoT device security assessments.
Rapidly assess software binaries, identify potential vulnerabilities, and extract critical insights using advanced reverse engineering techniques.
Performs comprehensive static and dynamic code analysis to uncover software architecture, dependencies, and potential vulnerabilities in complex systems.
Manages complex reasoning workflows by storing, retrieving, and dynamically linking agent-generated insights and reasoning traces in a structured database.
Automates GitHub repository interactions, syncing code, managing pull requests, and tracking project workflows with intelligent context awareness
Dynamically builds and refines AI reasoning strategies by tracking agent performance, learning patterns, and optimizing knowledge retrieval across complex problem-solving scenarios.
Diagnoses and resolves software bugs by analyzing code context, suggesting precise fixes, and providing step-by-step debugging guidance.
Generates optimized zero-downtime deployment and rollback strategies for distributed systems with automatic configuration management
Performs semantic vector search across document collections, enabling intelligent retrieval of contextually relevant information using advanced embedding techniques.
Performs comprehensive security and code quality audits on software projects, identifying vulnerabilities, style violations, and potential performance bottlenecks.