red-team-tools
Run Automated Red Team Reconnaissance
Bug bounty hunters and penetration testers need efficient reconnaissance workflows to enumerate targets and discover vulnerabilities. This skill provides automated pipelines using industry-standard tools like Amass, Subfinder, httpx, Nuclei, and ffuf for comprehensive security testing.
تنزيل ZIP المهارة
رفع في Claude
اذهب إلى Settings → Capabilities → Skills → Upload skill
فعّل وابدأ الاستخدام
اختبرها
استخدام "red-team-tools". subfinder -d target.com | httpx -title -status-code
النتيجة المتوقعة:
Subdomain enumeration results showing live hosts with HTTP titles and status codes for quick prioritization
استخدام "red-team-tools". nuclei -l live_hosts.txt -t cves/ -o cve_results.txt
النتيجة المتوقعة:
CVE vulnerability scan results with severity ratings, matched templates, and affected endpoints
التدقيق الأمني
مخاطر منخفضةThis skill provides legitimate red team methodology and bug bounty hunting workflows. Static findings flagged shell commands and network access, but these are standard security testing patterns (Amass, Subfinder, Nuclei, httpx, ffuf) used by authorized security professionals. No malicious intent detected. All flagged patterns represent legitimate defensive security tooling.
مشكلات متوسطة المخاطر (2)
عوامل الخطر
⚙️ الأوامر الخارجية (29)
🌐 الوصول إلى الشبكة (6)
درجة الجودة
ماذا يمكنك بناءه
Quick Subdomain Recon
Rapidly enumerate subdomains and check which ones are live, useful for initial target assessment during bug bounty hunts.
Full Vulnerability Assessment
Comprehensive scan from subdomain enumeration through technology fingerprinting to nuclei vulnerability scanning.
XSS Hunting Pipeline
Automated pipeline to discover parameters and test for XSS vulnerabilities using multiple techniques.
جرّب هذه الموجهات
Run a quick subdomain enumeration for [TARGET_DOMAIN] using subfinder and check which hosts are live with httpx. Output the results to a file.
Execute a complete reconnaissance workflow for [TARGET_DOMAIN]: 1) Run amass passive enum, 2) Use subfinder for additional subdomains, 3) Check live hosts with httprobe, 4) Run nuclei vulnerability scan on live hosts.
Help me set up an XSS hunting pipeline for [TARGET_DOMAIN]: 1) Use waybackurls to collect URLs, 2) Extract parameters, 3) Test with dalfox, 4) Verify findings with curl.
Enumerate API endpoints for [TARGET_DOMAIN] using ffuf with common API wordlists. Test for both v1 and v2 API versions and check for hidden HTTP methods.
أفضل الممارسات
- Always respect bug bounty program scope and rules before testing any target
- Use rate limiting and appropriate concurrency settings to avoid triggering blocks
- Verify all findings manually before submitting bug bounty reports to reduce duplicates
تجنب
- Running automated tools without understanding what each command does
- Ignoring program scope boundaries and testing out-of-scope targets
- Submitting findings without manual verification, creating noise for program triage teams