Back to tags
Tag

Agent Skills with tag: exploit-development

8 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

red-team-exploit-dev

Develop exploit scenarios for security testing and vulnerability assessment.

red-teamexploit-developmentvulnerability-assessmentpenetration-testing
starwreckntx
starwreckntx
1

prompt-hacking

Advanced prompt manipulation including direct attacks, indirect injection, and multi-turn exploitation

prompt-engineeringinjection-attacksexploit-developmentadversarial-techniques
pluginagentmarketplace
pluginagentmarketplace
1

penetration-testing

Ethical hacking and security testing methodologies using penetration testing tools, exploit frameworks, and manual security validation. Use when assessing application security posture and identifying exploitable vulnerabilities.

penetration-testingethical-hackingvulnerability-assessmentexploit-development
aj-geddes
aj-geddes
301

waf-bypass-hunter

Bypass a Coraza WAF protecting a vulnerable Next.js 16 backend. Analyze parser differentials between Go (WAF) and Node.js (backend) to find bypasses.

web-application-securityexploit-developmentvulnerability-assessmentwaf-bypass
hacktron
hacktron
739

ctf-solver

Solve CTF (Capture The Flag) challenges by analyzing challenge descriptions, source code, and interacting with challenge environments to capture flags.

ethical-hackingexploit-developmentpenetration-testingreconnaissance
hacktron
hacktron
739

Ethical Hacking Methodology

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit vulnerabilities", or "write penetration test reports". It provides comprehensive ethical hacking methodology and techniques.

ethical-hackingpenetration-testingreconnaissancevulnerability-assessment
zebbern
zebbern
2,951263

Pentest Commands

This skill should be used when the user asks to "run pentest commands", "scan with nmap", "use metasploit exploits", "crack passwords with hydra or john", "scan web vulnerabilities with nikto", "enumerate networks", or needs essential penetration testing command references.

pentestingnetwork-scanningexploit-developmentpassword-cracking
zebbern
zebbern
2,951263

Metasploit Framework

This skill should be used when the user asks to "use Metasploit for penetration testing", "exploit vulnerabilities with msfconsole", "create payloads with msfvenom", "perform post-exploitation", "use auxiliary modules for scanning", or "develop custom exploits". It provides comprehensive guidance for leveraging the Metasploit Framework in security assessments.

penetration-testingexploit-developmentmetasploit-frameworkpost-exploitation
zebbern
zebbern
2,951263