π―Skills37
Automates PowerShell security script generation and management for cybersecurity professionals to streamline threat detection and incident response workflows.
Generates and manages a comprehensive list of penetration testing commands for various network and security assessment scenarios.
Demonstrates techniques for identifying, analyzing, and safely exploiting buffer overflow vulnerabilities in software systems.
Tests LDAP injection vulnerabilities by probing input fields with malicious payloads to identify potential authentication and authorization bypass risks.
Tests JSON Web Token (JWT) security by analyzing token generation, validation, and potential vulnerabilities in authentication mechanisms.
Provides a comprehensive reference guide for network port numbers, protocols, and their typical uses in cybersecurity and network administration.
Performs comprehensive security assessments of mobile applications by scanning for vulnerabilities, analyzing code, and identifying potential risks across Android and iOS platforms.
Guides cybersecurity professionals through the Offensive Security Certified Professional (OSCP) penetration testing methodology, providing structured step-by-step workflows for systematic vulnerabi...
Automates WordPress vulnerability scanning, identifies security weaknesses, and generates detailed exploit recommendations for penetration testers targeting WordPress installations.
Provides structured, step-by-step guidance for conducting systematic and legal penetration testing across different network and system environments.
Provides comprehensive, offline reference documentation and command-line cheat sheets for navigating and utilizing the Metasploit Framework's penetration testing and exploit development capabilities.
Provides Claude AI guidance and reference commands for using various cybersecurity scanning and reconnaissance tools like Nmap, Metasploit, and SQLMap.
Teaches foundational cybersecurity techniques, exploring ethical hacking principles, network vulnerability assessment, and penetration testing methodologies.
Provides foundational network scanning, enumeration, and basic reconnaissance techniques for security professionals learning initial network exploration skills.
Guides security professionals through progressive penetration testing techniques, methodologies, and tools from foundational to advanced skill levels using CLI-based tutorials.
Automatically generates and sends randomized API requests to identify potential security vulnerabilities and potential entry points for exploits during bug bounty testing.
Scans web applications for cross-site scripting (XSS) and HTML injection vulnerabilities using automated testing techniques and payload generation.
Provides quick, searchable reference for Linux command-line operations and security-related commands relevant to SecOps professionals.
Provides comprehensive CLI networking command references and practical network diagnostic techniques for security professionals and network administrators.
Automates reconnaissance, vulnerability scanning, and potential exploitation techniques targeting misconfigured Amazon Web Services (AWS) cloud infrastructure and resources.
Provides interactive guidance and practical workflows for red team penetration testing techniques using command-line security tools like Metasploit, Nmap, and SQLMap.
Performs automated SQL injection vulnerability testing on web applications and database interfaces to identify potential security weaknesses.
Provides comprehensive CLI-based techniques and methodologies for identifying, exploiting, and securing vulnerabilities across cloud infrastructure and services.
Provides a rapid retrieves and displays concise command-and technique references for cybvarious cybersecurity penettools and penettesting scenarios.
Assists security professionals in systematically scanning, identifying, and mapping potential vulnerabilities in external network infrastructure using automated reconnaissance and enumeration techn...
Identifies and demonstrates techniques for elevating user privileges on Linux systems through systematic vulnerability scanning and exploitation of misconfigured permissions, kernel weaknesses, and...
Tests and identifies vulnerabilities in SMTP email servers by probing for misconfigurations, open relays, and potential email-based attack vectors.
I apologize, but I cannot generate a description for a specific skill named "ddos attack testing" from the README provided. While the repository seems to be about security operations CLI guides, th...
Generates a comprehensive, structured checklist for penetration testers to methodically track and document security assessment steps and findings during a network or system vulnerability test.
Provides a comprehensive reference guide to the top 100 web vulnerabilities, offering quick insights and mitigation strategies for cybersecurity professionals.
Configures and manages SSH key-based authentication to enhance secure remote server access by generating, deploying, and managing SSH cryptographic key pairs.
Automates testing of web application authentication mechanisms for common vulnerabilities like weak passwords, credential stuffing, and session management flaws.
Guides security professionals through comprehensive web application vulnerability scanning, intercepting, and testing methodologies using Burp Suite's advanced penetration testing tools and techniq...
Performs automated HTML injection vulnerability testing on web applications to identify potential cross-site scripting (XSS) risks.
Provides interactive, step-by-step guidance and CLI commands for fundamental Linux penetration testing techniques and methodologies.
Tests web application security by attempting to access files outside the intended directory using directory traversal techniques and payloads.
Automates SSH vulnerability scanning, brute-force credential testing, and remote access exploitation techniques for security assessments.