Red Team Tools and Methodology
Run Professional Bug Bounty Reconnaissance
Security researchers need structured methodology to discover vulnerabilities efficiently. This skill provides proven workflows from top bug bounty hunters for subdomain enumeration, live host discovery, and vulnerability scanning.
تنزيل ZIP المهارة
رفع في Claude
اذهب إلى Settings → Capabilities → Skills → Upload skill
فعّل وابدأ الاستخدام
اختبرها
استخدام "Red Team Tools and Methodology". Show me subdomain enumeration commands for example.com
النتيجة المتوقعة:
Here are the recommended subdomain enumeration commands:
1. Passive enumeration:
amass enum -passive -d example.com -src
subfinder -d example.com
assetfinder --subs-only example.com
2. Active enumeration:
amass enum -active -d example.com
3. Combine results:
cat *.txt | sort -u > all_subs.txt
استخدام "Red Team Tools and Methodology". How do I set up automated reconnaissance?
النتيجة المتوقعة:
Here is a basic automated recon script structure:
1. Subdomain enumeration: subfinder -d $domain
2. Live host check: cat subs.txt | httpx
3. URL collection: cat live.txt | waybackurls
4. Vulnerability scan: nuclei -l live.txt
Each step feeds into the next for an automated pipeline.
التدقيق الأمني
مخاطر منخفضةThis skill provides documentation for legitimate security testing tools and methodologies used in authorized bug bounty programs. The detected 'external_commands' are standard reconnaissance tools (amass, subfinder, httpx, nuclei) documented for educational purposes. The 'network' findings are example URLs and public reconnaissance services. No malicious code, exploits, or unauthorized access methods are present. The skill appropriately includes constraints for authorized testing within scope.
مشكلات متوسطة المخاطر (2)
مشكلات منخفضة المخاطر (1)
عوامل الخطر
⚙️ الأوامر الخارجية (28)
🌐 الوصول إلى الشبكة (6)
درجة الجودة
ماذا يمكنك بناءه
Set Up Bug Bounty Recon Pipeline
Automate the initial reconnaissance phase when starting a new bug bounty program engagement.
Learn Professional Testing Workflows
Study documented methodologies from experienced security professionals to improve testing efficiency.
Reference Security Tool Commands
Quickly look up correct syntax and options for common security testing tools during engagements.
جرّب هذه الموجهات
Show me how to enumerate subdomains for target.com using passive reconnaissance tools.
What is the workflow for discovering live web hosts from a list of subdomains?
Set up a comprehensive Nuclei scan workflow for discovered hosts.
Build an automated XSS testing pipeline using paramspider, Gxss, and dalfox.
أفضل الممارسات
- Always verify you have authorization before testing any target
- Respect bug bounty program rules and scope limitations
- Use rate limiting to avoid blocking or DoS
- Manually verify automated tool findings before reporting
تجنب
- Testing systems outside of authorized scope
- Running high-intensity fuzzing without permission
- Skipping manual verification of automated scanner results
- Ignoring program rules about rate limits and testing restrictions
الأسئلة المتكررة
Do I need special tools installed?
Can I use this skill for penetration testing?
Does this skill run scans automatically?
Are API keys required?
What is the target audience for this skill?
Is this skill legal to use?
تفاصيل المطور
المؤلف
sickn33الترخيص
MIT
المستودع
https://github.com/sickn33/antigravity-awesome-skills/tree/main/web-app/public/skills/red-team-toolsمرجع
main
بنية الملفات
📄 SKILL.md