red-team-tools
Run Automated Red Team Reconnaissance
Bug bounty hunters and penetration testers need efficient reconnaissance workflows to enumerate targets and discover vulnerabilities. This skill provides automated pipelines using industry-standard tools like Amass, Subfinder, httpx, Nuclei, and ffuf for comprehensive security testing.
Télécharger le ZIP du skill
Importer dans Claude
Allez dans Paramètres → Capacités → Skills → Importer un skill
Activez et commencez à utiliser
Tester
Utilisation de "red-team-tools". subfinder -d target.com | httpx -title -status-code
Résultat attendu:
Subdomain enumeration results showing live hosts with HTTP titles and status codes for quick prioritization
Utilisation de "red-team-tools". nuclei -l live_hosts.txt -t cves/ -o cve_results.txt
Résultat attendu:
CVE vulnerability scan results with severity ratings, matched templates, and affected endpoints
Audit de sécurité
Risque faibleThis skill provides legitimate red team methodology and bug bounty hunting workflows. Static findings flagged shell commands and network access, but these are standard security testing patterns (Amass, Subfinder, Nuclei, httpx, ffuf) used by authorized security professionals. No malicious intent detected. All flagged patterns represent legitimate defensive security tooling.
Problèmes à risque moyen (2)
Facteurs de risque
⚙️ Commandes externes (29)
🌐 Accès réseau (6)
Score de qualité
Ce que vous pouvez construire
Quick Subdomain Recon
Rapidly enumerate subdomains and check which ones are live, useful for initial target assessment during bug bounty hunts.
Full Vulnerability Assessment
Comprehensive scan from subdomain enumeration through technology fingerprinting to nuclei vulnerability scanning.
XSS Hunting Pipeline
Automated pipeline to discover parameters and test for XSS vulnerabilities using multiple techniques.
Essayez ces prompts
Run a quick subdomain enumeration for [TARGET_DOMAIN] using subfinder and check which hosts are live with httpx. Output the results to a file.
Execute a complete reconnaissance workflow for [TARGET_DOMAIN]: 1) Run amass passive enum, 2) Use subfinder for additional subdomains, 3) Check live hosts with httprobe, 4) Run nuclei vulnerability scan on live hosts.
Help me set up an XSS hunting pipeline for [TARGET_DOMAIN]: 1) Use waybackurls to collect URLs, 2) Extract parameters, 3) Test with dalfox, 4) Verify findings with curl.
Enumerate API endpoints for [TARGET_DOMAIN] using ffuf with common API wordlists. Test for both v1 and v2 API versions and check for hidden HTTP methods.
Bonnes pratiques
- Always respect bug bounty program scope and rules before testing any target
- Use rate limiting and appropriate concurrency settings to avoid triggering blocks
- Verify all findings manually before submitting bug bounty reports to reduce duplicates
Éviter
- Running automated tools without understanding what each command does
- Ignoring program scope boundaries and testing out-of-scope targets
- Submitting findings without manual verification, creating noise for program triage teams