Back to tags
Tag

Agent Skills with tag: penetration-testing

33 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

ffuf-web-fuzzing

Expert guidance for ffuf web fuzzing during penetration testing, including authenticated fuzzing with raw requests, auto-calibration, and result analysis

ffufweb-fuzzingpenetration-testingauthenticated-fuzzing
prof-ramos
prof-ramos
0

senior-security

Comprehensive security engineering skill for application security, penetration testing, security architecture, and compliance auditing. Includes security assessment tools, threat modeling, crypto implementation, and security automation. Use when designing security architecture, conducting penetration tests, implementing cryptography, or performing security audits.

security-architecturepenetration-testingcompliance-auditcryptography
ovachiever
ovachiever
81

security-testing-patterns

Security testing patterns including SAST, DAST, penetration testing, and vulnerability assessment techniques. Use when implementing security testing pipelines, conducting security audits, or validating application security controls.

security-testingSASTDASTpenetration-testing
NickCrew
NickCrew
52

red-team-exploit-dev

Develop exploit scenarios for security testing and vulnerability assessment.

red-teamexploit-developmentvulnerability-assessmentpenetration-testing
starwreckntx
starwreckntx
1

security

Production-grade security testing skill with OWASP Top 10, vulnerability scanning, penetration testing guidance, and compliance validation

OWASPvulnerability-scanningpenetration-testingcompliance-validation
pluginagentmarketplace
pluginagentmarketplace
1

code-injection

Test AI systems for code injection vulnerabilities including prompt-to-code attacks and agent exploitation

code-injectionvulnerability-testingprompt-injectionagent-exploitation
pluginagentmarketplace
pluginagentmarketplace
1

red-team-frameworks

Tools and frameworks for AI red teaming including PyRIT, garak, Counterfit, and custom attack automation

red-teamingattack-automationpenetration-testingai-security
pluginagentmarketplace
pluginagentmarketplace
1

testing-methodologies

Structured approaches for AI security testing including threat modeling, penetration testing, and red team operations

threat-modelingpenetration-testingred-teamsecurity-testing
pluginagentmarketplace
pluginagentmarketplace
1

security-audit

Performs comprehensive security audits identifying vulnerabilities, misconfigurations, and security best practice violations. Trigger keywords: security, audit, vulnerability, CVE, OWASP, penetration, security review, hardening.

vulnerability-assessmentpenetration-testingsecurity-testingOWASP
cosmix
cosmix
3

security-reviewer

Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews. Keywords: security review, vulnerability, SAST, audit, penetration testing, cloud security.

vulnerability-scanningpenetration-testingstatic-analysiscloud-security
Jeffallan
Jeffallan
245

ffuf-web-fuzzing

Expert guidance for ffuf web fuzzing during penetration testing, including authenticated fuzzing with raw requests, auto-calibration, and result analysis

fuzzingpenetration-testingauthentication-testingweb-application-security
danielmiessler
danielmiessler
305

security-testing

Identify security vulnerabilities through SAST, DAST, penetration testing, and dependency scanning. Use for security test, vulnerability scanning, OWASP, SQL injection, XSS, CSRF, and penetration testing.

static-analysispenetration-testingvulnerability-scanningweb-application-security
aj-geddes
aj-geddes
301

penetration-testing

Ethical hacking and security testing methodologies using penetration testing tools, exploit frameworks, and manual security validation. Use when assessing application security posture and identifying exploitable vulnerabilities.

penetration-testingethical-hackingvulnerability-assessmentexploit-development
aj-geddes
aj-geddes
301

ffuf-web-fuzzing

Expert guidance for ffuf web fuzzing during penetration testing, including authenticated fuzzing with raw requests, auto-calibration, and result analysis

fuzzingpenetration-testingweb-vulnerability-scanningauthentication-testing
jthack
jthack
925

ctf-solver

Solve CTF (Capture The Flag) challenges by analyzing challenge descriptions, source code, and interacting with challenge environments to capture flags.

ethical-hackingexploit-developmentpenetration-testingreconnaissance
hacktron
hacktron
739

picocom

Use picocom to interact with IoT device UART consoles for pentesting operations including device enumeration, vulnerability discovery, bootloader manipulation, and gaining root shells. Use when the user needs to interact with embedded devices, IoT hardware, or serial consoles.

penetration-testingvulnerability-assessmentiot-devicesterminal
BrownFineSecurity
BrownFineSecurity
47984

Cross-Site Scripting and HTML Injection Testing

This skill should be used when the user asks to "test for XSS vulnerabilities", "perform cross-site scripting attacks", "identify HTML injection flaws", "exploit client-side injection vulnerabilities", "steal cookies via XSS", or "bypass content security policies". It provides comprehensive techniques for detecting, exploiting, and understanding XSS and HTML injection attack vectors in web applications.

web-application-securityxsshtml-injectionpenetration-testing
zebbern
zebbern
2,951263

SQL Injection Testing

This skill should be used when the user asks to "test for SQL injection vulnerabilities", "perform SQLi attacks", "bypass authentication using SQL injection", "extract database information through injection", "detect SQL injection flaws", or "exploit database query vulnerabilities". It provides comprehensive techniques for identifying, exploiting, and understanding SQL injection attack vectors across different database systems.

sql-injectionpenetration-testingvulnerability-assessmentdatabase-security
zebbern
zebbern
2,951263

Page 1 of 2 · 33 results