Back to tags
Tag

Agent Skills with tag: vulnerability-assessment

9 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

security-review

보안, 보안 리뷰, 보안 검토, 취약점, 보안 분석 - Use when reviewing code for security vulnerabilities, designing authentication/authorization, or ensuring secure architecture. Provides systematic security analysis based on OWASP guidelines.

security-reviewOWASPvulnerability-assessmentauthentication
aimskr
aimskr
0

security-testing-patterns

Security testing patterns including SAST, DAST, penetration testing, and vulnerability assessment techniques. Use when implementing security testing pipelines, conducting security audits, or validating application security controls.

security-testingSASTDASTpenetration-testing
NickCrew
NickCrew
52

red-team-exploit-dev

Develop exploit scenarios for security testing and vulnerability assessment.

red-teamexploit-developmentvulnerability-assessmentpenetration-testing
starwreckntx
starwreckntx
1

internal-red-team-audit

Execute internal red team security audits to identify protocol vulnerabilities and alignment risks.

red-teamsecurity-auditvulnerability-assessmentrisk-alignment
starwreckntx
starwreckntx
1

SQL Injection Testing

This skill should be used when the user asks to "test for SQL injection vulnerabilities", "perform SQLi attacks", "bypass authentication using SQL injection", "extract database information through injection", "detect SQL injection flaws", or "exploit database query vulnerabilities". It provides comprehensive techniques for identifying, exploiting, and understanding SQL injection attack vectors across different database systems.

sql-injectionpenetration-testingvulnerability-assessmentdatabase-security
zebbern
zebbern
0

Ethical Hacking Methodology

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit vulnerabilities", or "write penetration test reports". It provides comprehensive ethical hacking methodology and techniques.

ethical-hackingpenetration-testingreconnaissancevulnerability-assessment
zebbern
zebbern
0

SSH Penetration Testing

This skill should be used when the user asks to "pentest SSH services", "enumerate SSH configurations", "brute force SSH credentials", "exploit SSH vulnerabilities", "perform SSH tunneling", or "audit SSH security". It provides comprehensive SSH penetration testing methodologies and techniques.

sshpenetration-testingvulnerability-assessmentbrute-force
zebbern
zebbern
0

SMTP Penetration Testing

This skill should be used when the user asks to "perform SMTP penetration testing", "enumerate email users", "test for open mail relays", "grab SMTP banners", "brute force email credentials", or "assess mail server security". It provides comprehensive techniques for testing SMTP server security.

smtppenetration-testingemail-securityvulnerability-assessment
zebbern
zebbern
0

security-audit

Agent Skill: Security audit patterns for PHP/OWASP. Use when conducting security assessments, identifying vulnerabilities (XXE, SQL injection, XSS), or CVSS scoring. By Netresearch.

PHPOWASPvulnerability-assessmentCVSS
netresearch
netresearch
20