Back to tags
Tag

Agent Skills with tag: reconnaissance

8 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

discover-protocols

Automatically discover protocol skills when working with HTTP, TCP, UDP, QUIC, and network protocols

network-protocolsprotocol-analysisnetwork-servicesreconnaissance
rand
rand
487

ctf-solver

Solve CTF (Capture The Flag) challenges by analyzing challenge descriptions, source code, and interacting with challenge environments to capture flags.

ethical-hackingexploit-developmentpenetration-testingreconnaissance
hacktron
hacktron
739

ffind

Advanced file finder with type detection and filesystem extraction for analyzing firmware and extracting embedded filesystems. Use when you need to analyze firmware files, identify file types, or extract ext2/3/4 or F2FS filesystems.

reconnaissancestatic-analysisfirmware-analysisfilesystem-extraction
BrownFineSecurity
BrownFineSecurity
47984

wsdiscovery

WS-Discovery protocol scanner for discovering and enumerating ONVIF cameras and IoT devices on the network. Use when you need to discover ONVIF devices, cameras, or WS-Discovery enabled equipment on a network.

network-scanningnetwork-protocolsiot-devicesreconnaissance
BrownFineSecurity
BrownFineSecurity
47984

nmap

Professional network reconnaissance and port scanning using nmap. Supports various scan types (quick, full, UDP, stealth), service detection, vulnerability scanning, and NSE scripts. Use when you need to enumerate network services, detect versions, or perform network reconnaissance.

reconnaissancenetwork-scanningvulnerability-scanningservice-detection
BrownFineSecurity
BrownFineSecurity
47984

Ethical Hacking Methodology

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit vulnerabilities", or "write penetration test reports". It provides comprehensive ethical hacking methodology and techniques.

ethical-hackingpenetration-testingreconnaissancevulnerability-assessment
zebbern
zebbern
2,951263

Shodan Reconnaissance and Pentesting

This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan reconnaissance," "find vulnerable services using Shodan," "scan IP ranges with Shodan," or "discover IoT devices and open ports." It provides comprehensive guidance for using Shodan's search engine, CLI, and API for penetration testing reconnaissance.

shodanreconnaissancepentestingapi
zebbern
zebbern
2,951263

Red Team Tools and Methodology

This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or needs security researcher techniques and tool configurations from top bug bounty hunters.

red-teambug-bountyreconnaissancepentesting
zebbern
zebbern
2,951263