Red Team Tools and Methodology
Run Professional Bug Bounty Reconnaissance
Security researchers need structured methodology to discover vulnerabilities efficiently. This skill provides proven workflows from top bug bounty hunters for subdomain enumeration, live host discovery, and vulnerability scanning.
Die Skill-ZIP herunterladen
In Claude hochladen
Gehe zu Einstellungen → Fähigkeiten → Skills → Skill hochladen
Einschalten und loslegen
Teste es
Verwendung von "Red Team Tools and Methodology". Show me subdomain enumeration commands for example.com
Erwartetes Ergebnis:
Here are the recommended subdomain enumeration commands:
1. Passive enumeration:
amass enum -passive -d example.com -src
subfinder -d example.com
assetfinder --subs-only example.com
2. Active enumeration:
amass enum -active -d example.com
3. Combine results:
cat *.txt | sort -u > all_subs.txt
Verwendung von "Red Team Tools and Methodology". How do I set up automated reconnaissance?
Erwartetes Ergebnis:
Here is a basic automated recon script structure:
1. Subdomain enumeration: subfinder -d $domain
2. Live host check: cat subs.txt | httpx
3. URL collection: cat live.txt | waybackurls
4. Vulnerability scan: nuclei -l live.txt
Each step feeds into the next for an automated pipeline.
Sicherheitsaudit
Niedriges RisikoThis skill provides documentation for legitimate security testing tools and methodologies used in authorized bug bounty programs. The detected 'external_commands' are standard reconnaissance tools (amass, subfinder, httpx, nuclei) documented for educational purposes. The 'network' findings are example URLs and public reconnaissance services. No malicious code, exploits, or unauthorized access methods are present. The skill appropriately includes constraints for authorized testing within scope.
Probleme mit mittlerem Risiko (2)
Probleme mit niedrigem Risiko (1)
Risikofaktoren
⚙️ Externe Befehle (28)
🌐 Netzwerkzugriff (6)
Qualitätsbewertung
Was du bauen kannst
Set Up Bug Bounty Recon Pipeline
Automate the initial reconnaissance phase when starting a new bug bounty program engagement.
Learn Professional Testing Workflows
Study documented methodologies from experienced security professionals to improve testing efficiency.
Reference Security Tool Commands
Quickly look up correct syntax and options for common security testing tools during engagements.
Probiere diese Prompts
Show me how to enumerate subdomains for target.com using passive reconnaissance tools.
What is the workflow for discovering live web hosts from a list of subdomains?
Set up a comprehensive Nuclei scan workflow for discovered hosts.
Build an automated XSS testing pipeline using paramspider, Gxss, and dalfox.
Bewährte Verfahren
- Always verify you have authorization before testing any target
- Respect bug bounty program rules and scope limitations
- Use rate limiting to avoid blocking or DoS
- Manually verify automated tool findings before reporting
Vermeiden
- Testing systems outside of authorized scope
- Running high-intensity fuzzing without permission
- Skipping manual verification of automated scanner results
- Ignoring program rules about rate limits and testing restrictions
Häufig gestellte Fragen
Do I need special tools installed?
Can I use this skill for penetration testing?
Does this skill run scans automatically?
Are API keys required?
What is the target audience for this skill?
Is this skill legal to use?
Entwicklerdetails
Autor
sickn33Lizenz
MIT
Repository
https://github.com/sickn33/antigravity-awesome-skills/tree/main/web-app/public/skills/red-team-toolsRef
main
Dateistruktur
📄 SKILL.md