This skill should be used when the user asks to "perform cloud penetration testing", "assess Azure or AWS or GCP...
cat ~/Top
Browse top skills sorted by GitHub stars
This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle",...
This skill should be used when the user asks to "test for directory traversal", "exploit path traversal...
This skill should be used when the user asks to "test for HTML injection", "inject HTML into web pages", "perform...
This skill should be used when the user asks to "test for insecure direct object references," "find IDOR...
This skill should be used when the user asks to "escalate privileges on Linux", "find privesc vectors on Linux...
This skill should be used when the user asks to "create bash scripts", "automate Linux tasks", "monitor system...
This skill should be used when the user asks to "use Metasploit for penetration testing", "exploit vulnerabilities...
This skill should be used when the user asks to "set up a web server", "configure HTTP or HTTPS", "perform SNMP...
This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist",...
This skill should be used when the user asks to "run pentest commands", "scan with nmap", "use metasploit exploits",...
This skill should be used when the user asks to "escalate privileges", "get root access", "become administrator",...
This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting",...
This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports",...
This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan...
This skill should be used when the user asks to "perform SMTP penetration testing", "enumerate email users", "test...
This skill should be used when the user asks to "test for SQL injection vulnerabilities", "perform SQLi attacks",...
This skill should be used when the user asks to "automate SQL injection testing," "enumerate database structure,"...
This skill should be used when the user asks to "pentest SSH services", "enumerate SSH configurations", "brute force...
This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security...
This skill should be used when the user asks to "escalate privileges on Windows," "find Windows privesc vectors,"...
This skill should be used when the user asks to "analyze network traffic with Wireshark", "capture packets for...
This skill should be used when the user asks to "pentest WordPress sites", "scan WordPress for vulnerabilities",...
This skill should be used when the user asks to "test for XSS vulnerabilities", "perform cross-site scripting...