Back to tags
Tag

Agent Skills with tag: ethical-hacking

7 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

red-team-exploit-dev

Develop exploit scenarios for security testing and vulnerability assessment.

red-teamexploit-developmentvulnerability-assessmentpenetration-testing
starwreckntx
starwreckntx
1

responsible-disclosure

Ethical vulnerability reporting, coordinated disclosure, and bug bounty participation for AI systems

ethical-hackingresponsible-disclosurebug-bountyvulnerability-reporting
pluginagentmarketplace
pluginagentmarketplace
1

penetration-testing

Ethical hacking and security testing methodologies using penetration testing tools, exploit frameworks, and manual security validation. Use when assessing application security posture and identifying exploitable vulnerabilities.

penetration-testingethical-hackingvulnerability-assessmentexploit-development
aj-geddes
aj-geddes
301

ctf-solver

Solve CTF (Capture The Flag) challenges by analyzing challenge descriptions, source code, and interacting with challenge environments to capture flags.

ethical-hackingexploit-developmentpenetration-testingreconnaissance
hacktron
hacktron
739

red-team-tactics

Red team tactics principles based on MITRE ATT&CK. Attack phases, detection evasion, reporting.

red-teamethical-hackingmitre-attckdetection-evasion
xenitV1
xenitV1
10917

telnetshell

Use telnet to interact with IoT device shells for pentesting operations including device enumeration, vulnerability discovery, credential testing, and post-exploitation. Use when the user needs to interact with network-accessible shells, IoT devices, or telnet services.

iot-devicesnetwork-protocolsethical-hackingpost-exploitation
BrownFineSecurity
BrownFineSecurity
47984

Ethical Hacking Methodology

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit vulnerabilities", or "write penetration test reports". It provides comprehensive ethical hacking methodology and techniques.

ethical-hackingpenetration-testingreconnaissancevulnerability-assessment
zebbern
zebbern
2,951263