Back to tags
Tag

Agent Skills with tag: red-team

7 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

red-team-exploit-dev

Develop exploit scenarios for security testing and vulnerability assessment.

red-teamexploit-developmentvulnerability-assessmentpenetration-testing
starwreckntx
starwreckntx
1

internal-red-team-audit

Execute internal red team security audits to identify protocol vulnerabilities and alignment risks.

red-teamsecurity-auditvulnerability-assessmentrisk-alignment
starwreckntx
starwreckntx
1

red-team-reporting

Professional security report generation, executive summaries, finding documentation, and remediation tracking

red-teamreportingexecutive-summariesremediation-tracking
pluginagentmarketplace
pluginagentmarketplace
1

testing-methodologies

Structured approaches for AI security testing including threat modeling, penetration testing, and red team operations

threat-modelingpenetration-testingred-teamsecurity-testing
pluginagentmarketplace
pluginagentmarketplace
1

prd-v05-risk-discovery-interview

Surface risks through guided questioning, helping users consider pivots, constraints, and prioritization during PRD v0.5 Red Team Review. Triggers on requests to identify risks, stress-test the idea, perform red team review, or when user asks "what could go wrong?", "identify risks", "red team", "risk assessment", "challenge assumptions", "stress test the idea". Consumes all prior IDs (CFD-, BR-, FEA-, PER-, UJ-, SCR-) as interview context. Outputs RISK- entries with owner decisions and mitigations. Feeds v0.5 Technical Stack Selection.

risk-prioritizationrisk-mitigationred-teamassumption-challenging
mattgierhart
mattgierhart
61

red-team-tactics

Red team tactics principles based on MITRE ATT&CK. Attack phases, detection evasion, reporting.

red-teamethical-hackingmitre-attckdetection-evasion
xenitV1
xenitV1
10917

Red Team Tools and Methodology

This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or needs security researcher techniques and tool configurations from top bug bounty hunters.

red-teambug-bountyreconnaissancepentesting
zebbern
zebbern
2,951263