This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports",...
find ~/zebbern/ -name "*.skill"
This skill should be used when the user asks to "escalate privileges on Linux", "find privesc vectors on Linux...
This skill should be used when the user asks to "intercept HTTP traffic", "modify web requests", "use Burp Suite for...
This skill should be used when the user asks to "escalate privileges", "get root access", "become administrator",...
This skill should be used when the user asks to "use Metasploit for penetration testing", "exploit vulnerabilities...
This skill should be used when the user asks to "test for HTML injection", "inject HTML into web pages", "perform...
This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan...
This skill should be used when the user asks to "test API security", "fuzz APIs", "find IDOR vulnerabilities", "test...
This skill should be used when the user asks to "create bash scripts", "automate Linux tasks", "monitor system...
This skill should be used when the user asks to "perform cloud penetration testing", "assess Azure or AWS or GCP...
This skill should be used when the user asks to "run pentest commands", "scan with nmap", "use metasploit exploits",...
This skill should be used when the user asks to "set up a web server", "configure HTTP or HTTPS", "perform SNMP...
This skill should be used when the user asks to "test for directory traversal", "exploit path traversal...
This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting",...
This skill should be used when the user asks to "test for broken authentication vulnerabilities", "assess session...
This skill should be used when the user asks to "test for insecure direct object references," "find IDOR...
This skill should be used when the user asks to "attack Active Directory", "exploit AD", "Kerberoasting", "DCSync",...
This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud...
This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle",...
This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist",...