red-team-tools
Run Automated Red Team Reconnaissance
Bug bounty hunters and penetration testers need efficient reconnaissance workflows to enumerate targets and discover vulnerabilities. This skill provides automated pipelines using industry-standard tools like Amass, Subfinder, httpx, Nuclei, and ffuf for comprehensive security testing.
Die Skill-ZIP herunterladen
In Claude hochladen
Gehe zu Einstellungen → Fähigkeiten → Skills → Skill hochladen
Einschalten und loslegen
Teste es
Verwendung von "red-team-tools". subfinder -d target.com | httpx -title -status-code
Erwartetes Ergebnis:
Subdomain enumeration results showing live hosts with HTTP titles and status codes for quick prioritization
Verwendung von "red-team-tools". nuclei -l live_hosts.txt -t cves/ -o cve_results.txt
Erwartetes Ergebnis:
CVE vulnerability scan results with severity ratings, matched templates, and affected endpoints
Sicherheitsaudit
Niedriges RisikoThis skill provides legitimate red team methodology and bug bounty hunting workflows. Static findings flagged shell commands and network access, but these are standard security testing patterns (Amass, Subfinder, Nuclei, httpx, ffuf) used by authorized security professionals. No malicious intent detected. All flagged patterns represent legitimate defensive security tooling.
Probleme mit mittlerem Risiko (2)
Risikofaktoren
⚙️ Externe Befehle (29)
🌐 Netzwerkzugriff (6)
Qualitätsbewertung
Was du bauen kannst
Quick Subdomain Recon
Rapidly enumerate subdomains and check which ones are live, useful for initial target assessment during bug bounty hunts.
Full Vulnerability Assessment
Comprehensive scan from subdomain enumeration through technology fingerprinting to nuclei vulnerability scanning.
XSS Hunting Pipeline
Automated pipeline to discover parameters and test for XSS vulnerabilities using multiple techniques.
Probiere diese Prompts
Run a quick subdomain enumeration for [TARGET_DOMAIN] using subfinder and check which hosts are live with httpx. Output the results to a file.
Execute a complete reconnaissance workflow for [TARGET_DOMAIN]: 1) Run amass passive enum, 2) Use subfinder for additional subdomains, 3) Check live hosts with httprobe, 4) Run nuclei vulnerability scan on live hosts.
Help me set up an XSS hunting pipeline for [TARGET_DOMAIN]: 1) Use waybackurls to collect URLs, 2) Extract parameters, 3) Test with dalfox, 4) Verify findings with curl.
Enumerate API endpoints for [TARGET_DOMAIN] using ffuf with common API wordlists. Test for both v1 and v2 API versions and check for hidden HTTP methods.
Bewährte Verfahren
- Always respect bug bounty program scope and rules before testing any target
- Use rate limiting and appropriate concurrency settings to avoid triggering blocks
- Verify all findings manually before submitting bug bounty reports to reduce duplicates
Vermeiden
- Running automated tools without understanding what each command does
- Ignoring program scope boundaries and testing out-of-scope targets
- Submitting findings without manual verification, creating noise for program triage teams