GitHub
Skills harvested from GitHub repositories
14810 skills availablepentest-commands
Provide a comprehensive command reference for penetration testing tools including network scanning, exploitation, passwo...
metasploit-framework
Leverage the Metasploit Framework for comprehensive penetration testing, from initial exploitation through post-exploita...
linux-shell-scripting
Provide production-ready shell script templates for common Linux system administration tasks including backups, monitori...
linux-privilege-escalation
Execute systematic privilege escalation assessments on Linux systems to identify and exploit misconfigurations, vulnerab...
cloud-penetration-testing
Conduct comprehensive security assessments of cloud infrastructure across Microsoft Azure, Amazon Web Services (AWS), an...
wordpress-penetration-testing
Conduct comprehensive security assessments of WordPress installations including enumeration of users, themes, and plugin...
network-101
Configure and test common network services (HTTP, HTTPS, SNMP, SMB) for penetration testing lab environments. Enable han...
html-injection-testing
Identify and exploit HTML injection vulnerabilities that allow attackers to inject malicious HTML content into web appli...
windows-privilege-escalation
Provide systematic methodologies for discovering and exploiting privilege escalation vulnerabilities on Windows systems ...
wireshark-analysis
Execute comprehensive network traffic analysis using Wireshark to capture, filter, and examine network packets for secur...
file-path-traversal
Identify and exploit file path traversal (directory traversal) vulnerabilities that allow attackers to read arbitrary fi...
sql-injection-testing
Execute comprehensive SQL injection vulnerability assessments on web applications to identify database security flaws, d...
api-fuzzing-bug-bounty
Provide comprehensive techniques for testing REST, SOAP, and GraphQL APIs during bug bounty hunting and penetration test...
shodan-reconnaissance
Provide systematic methodologies for leveraging Shodan as a reconnaissance tool during penetration testing engagements. ...
broken-authentication
Identify and exploit authentication and session management vulnerabilities in web applications. Broken authentication co...
privilege-escalation-methods
Provide comprehensive techniques for escalating privileges from a low-privileged user to root/administrator access on co...
scanning-tools
Master essential security scanning tools for network discovery, vulnerability assessment, web application testing, wirel...
pentest-checklist
Provide a comprehensive checklist for planning, executing, and following up on penetration tests. Ensure thorough prepar...
aws-penetration-testing
Provide comprehensive techniques for penetration testing AWS cloud environments. Covers IAM enumeration, privilege escal...
idor-testing
Provide systematic methodologies for identifying and exploiting Insecure Direct Object Reference (IDOR) vulnerabilities ...
ssh-penetration-testing
Conduct comprehensive SSH security assessments including enumeration, credential attacks, vulnerability exploitation, tu...
ethical-hacking-methodology
Master the complete penetration testing lifecycle from reconnaissance through reporting. This skill covers the five stag...
xss-html-injection
Execute comprehensive client-side injection vulnerability assessments on web applications to identify XSS and HTML injec...
burp-suite-testing
Execute comprehensive web application security testing using Burp Suite's integrated toolset, including HTTP traffic int...