Back to tags
Tag

Agent Skills with tag: post-exploitation

4 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

telnetshell

Use telnet to interact with IoT device shells for pentesting operations including device enumeration, vulnerability discovery, credential testing, and post-exploitation. Use when the user needs to interact with network-accessible shells, IoT devices, or telnet services.

iot-devicesnetwork-protocolsethical-hackingpost-exploitation
BrownFineSecurity
BrownFineSecurity
47984

Windows Privilege Escalation

This skill should be used when the user asks to "escalate privileges on Windows," "find Windows privesc vectors," "enumerate Windows for privilege escalation," "exploit Windows misconfigurations," or "perform post-exploitation privilege escalation." It provides comprehensive guidance for discovering and exploiting privilege escalation vulnerabilities in Windows environments.

windowsprivilege-escalationpost-exploitationpentesting
zebbern
zebbern
2,951263

Metasploit Framework

This skill should be used when the user asks to "use Metasploit for penetration testing", "exploit vulnerabilities with msfconsole", "create payloads with msfvenom", "perform post-exploitation", "use auxiliary modules for scanning", or "develop custom exploits". It provides comprehensive guidance for leveraging the Metasploit Framework in security assessments.

penetration-testingexploit-developmentmetasploit-frameworkpost-exploitation
zebbern
zebbern
2,951263

Privilege Escalation Methods

This skill should be used when the user asks to "escalate privileges", "get root access", "become administrator", "privesc techniques", "abuse sudo", "exploit SUID binaries", "Kerberoasting", "pass-the-ticket", "token impersonation", or needs guidance on post-exploitation privilege escalation for Linux or Windows systems.

privilege-escalationpost-exploitationlinuxwindows
zebbern
zebbern
2,951263