red-team-tools
Run Automated Red Team Reconnaissance
Bug bounty hunters and penetration testers need efficient reconnaissance workflows to enumerate targets and discover vulnerabilities. This skill provides automated pipelines using industry-standard tools like Amass, Subfinder, httpx, Nuclei, and ffuf for comprehensive security testing.
Descargar el ZIP de la skill
Subir en Claude
Ve a Configuración → Capacidades → Skills → Subir skill
Activa y empieza a usar
Pruébalo
Usando "red-team-tools". subfinder -d target.com | httpx -title -status-code
Resultado esperado:
Subdomain enumeration results showing live hosts with HTTP titles and status codes for quick prioritization
Usando "red-team-tools". nuclei -l live_hosts.txt -t cves/ -o cve_results.txt
Resultado esperado:
CVE vulnerability scan results with severity ratings, matched templates, and affected endpoints
Auditoría de seguridad
Riesgo bajoThis skill provides legitimate red team methodology and bug bounty hunting workflows. Static findings flagged shell commands and network access, but these are standard security testing patterns (Amass, Subfinder, Nuclei, httpx, ffuf) used by authorized security professionals. No malicious intent detected. All flagged patterns represent legitimate defensive security tooling.
Problemas de riesgo medio (2)
Factores de riesgo
⚙️ Comandos externos (29)
🌐 Acceso a red (6)
Puntuación de calidad
Lo que puedes crear
Quick Subdomain Recon
Rapidly enumerate subdomains and check which ones are live, useful for initial target assessment during bug bounty hunts.
Full Vulnerability Assessment
Comprehensive scan from subdomain enumeration through technology fingerprinting to nuclei vulnerability scanning.
XSS Hunting Pipeline
Automated pipeline to discover parameters and test for XSS vulnerabilities using multiple techniques.
Prueba estos prompts
Run a quick subdomain enumeration for [TARGET_DOMAIN] using subfinder and check which hosts are live with httpx. Output the results to a file.
Execute a complete reconnaissance workflow for [TARGET_DOMAIN]: 1) Run amass passive enum, 2) Use subfinder for additional subdomains, 3) Check live hosts with httprobe, 4) Run nuclei vulnerability scan on live hosts.
Help me set up an XSS hunting pipeline for [TARGET_DOMAIN]: 1) Use waybackurls to collect URLs, 2) Extract parameters, 3) Test with dalfox, 4) Verify findings with curl.
Enumerate API endpoints for [TARGET_DOMAIN] using ffuf with common API wordlists. Test for both v1 and v2 API versions and check for hidden HTTP methods.
Mejores prácticas
- Always respect bug bounty program scope and rules before testing any target
- Use rate limiting and appropriate concurrency settings to avoid triggering blocks
- Verify all findings manually before submitting bug bounty reports to reduce duplicates
Evitar
- Running automated tools without understanding what each command does
- Ignoring program scope boundaries and testing out-of-scope targets
- Submitting findings without manual verification, creating noise for program triage teams