Back to tags
Tag

Agent Skills with tag: vulnerability-assessment

26 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

software-security

A software security skill that integrates with Project CodeGuard to help AI coding agents write secure code and prevent common vulnerabilities. Use this skill when writing, reviewing, or modifying code to ensure secure-by-default practices are followed.

static-analysisvulnerability-assessmentsecurity-testingsecure-coding
project-codeguard
project-codeguard
36449

picocom

Use picocom to interact with IoT device UART consoles for pentesting operations including device enumeration, vulnerability discovery, bootloader manipulation, and gaining root shells. Use when the user needs to interact with embedded devices, IoT hardware, or serial consoles.

penetration-testingvulnerability-assessmentiot-devicesterminal
BrownFineSecurity
BrownFineSecurity
47984

jadx

Android APK decompiler that converts DEX bytecode to readable Java source code. Use when you need to decompile APK files, analyze app logic, search for vulnerabilities, find hardcoded credentials, or understand app behavior through readable source code.

static-analysisvulnerability-assessmentreverse-engineeringandroid
BrownFineSecurity
BrownFineSecurity
47984

SQL Injection Testing

This skill should be used when the user asks to "test for SQL injection vulnerabilities", "perform SQLi attacks", "bypass authentication using SQL injection", "extract database information through injection", "detect SQL injection flaws", or "exploit database query vulnerabilities". It provides comprehensive techniques for identifying, exploiting, and understanding SQL injection attack vectors across different database systems.

sql-injectionpenetration-testingvulnerability-assessmentdatabase-security
zebbern
zebbern
2,951263

Ethical Hacking Methodology

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit vulnerabilities", or "write penetration test reports". It provides comprehensive ethical hacking methodology and techniques.

ethical-hackingpenetration-testingreconnaissancevulnerability-assessment
zebbern
zebbern
2,951263

SSH Penetration Testing

This skill should be used when the user asks to "pentest SSH services", "enumerate SSH configurations", "brute force SSH credentials", "exploit SSH vulnerabilities", "perform SSH tunneling", or "audit SSH security". It provides comprehensive SSH penetration testing methodologies and techniques.

sshpenetration-testingvulnerability-assessmentbrute-force
zebbern
zebbern
2,951263

SMTP Penetration Testing

This skill should be used when the user asks to "perform SMTP penetration testing", "enumerate email users", "test for open mail relays", "grab SMTP banners", "brute force email credentials", or "assess mail server security". It provides comprehensive techniques for testing SMTP server security.

smtppenetration-testingemail-securityvulnerability-assessment
zebbern
zebbern
2,951263

security-audit

Agent Skill: Security audit patterns for PHP/OWASP. Use when conducting security assessments, identifying vulnerabilities (XXE, SQL injection, XSS), or CVSS scoring. By Netresearch.

PHPOWASPvulnerability-assessmentCVSS
netresearch
netresearch
9

Page 2 of 2 · 26 results