Collection37 items

zebbern/secops-cli-guides

View on GitHub
1stars

🎯Skills37

🎯powershell-scripting-for-security🎯Skill

Automates PowerShell security script generation and management for cybersecurity professionals to streamline threat detection and incident response workflows.

powershell-scripting-for-security
🎯pentest-commands🎯Skill

Generates and manages a comprehensive list of penetration testing commands for various network and security assessment scenarios.

pentest-commands
🎯buffer-overflow-exploitation🎯Skill

Demonstrates techniques for identifying, analyzing, and safely exploiting buffer overflow vulnerabilities in software systems.

buffer-overflow-exploitation
🎯ldap-injection-testing🎯Skill

Tests LDAP injection vulnerabilities by probing input fields with malicious payloads to identify potential authentication and authorization bypass risks.

ldap-injection-testing
🎯jwt-security-testing🎯Skill

Tests JSON Web Token (JWT) security by analyzing token generation, validation, and potential vulnerabilities in authentication mechanisms.

jwt-security-testing
🎯network-ports-reference🎯Skill

Provides a comprehensive reference guide for network port numbers, protocols, and their typical uses in cybersecurity and network administration.

network-ports-reference
🎯mobile application security testing🎯Skill

Performs comprehensive security assessments of mobile applications by scanning for vulnerabilities, analyzing code, and identifying potential risks across Android and iOS platforms.

mobile application security testing
🎯oscp penetration testing methodology🎯Skill

Guides cybersecurity professionals through the Offensive Security Certified Professional (OSCP) penetration testing methodology, providing structured step-by-step workflows for systematic vulnerabi...

oscp penetration testing methodology
🎯wordpress penetration testing🎯Skill

Automates WordPress vulnerability scanning, identifies security weaknesses, and generates detailed exploit recommendations for penetration testers targeting WordPress installations.

wordpress penetration testing
🎯ethical hacking methodology🎯Skill

Provides structured, step-by-step guidance for conducting systematic and legal penetration testing across different network and system environments.

ethical hacking methodology
🎯metasploit framework🎯Skill

Provides comprehensive, offline reference documentation and command-line cheat sheets for navigating and utilizing the Metasploit Framework's penetration testing and exploit development capabilities.

metasploit framework
🎯security scanning tools🎯Skill

Provides Claude AI guidance and reference commands for using various cybersecurity scanning and reconnaissance tools like Nmap, Metasploit, and SQLMap.

security scanning tools
🎯hacking-fundamentals🎯Skill

Teaches foundational cybersecurity techniques, exploring ethical hacking principles, network vulnerability assessment, and penetration testing methodologies.

hacking-fundamentals
🎯network 101🎯Skill

Provides foundational network scanning, enumeration, and basic reconnaissance techniques for security professionals learning initial network exploration skills.

network 101
🎯pentesting from beginner to advanced🎯Skill

Guides security professionals through progressive penetration testing techniques, methodologies, and tools from foundational to advanced skill levels using CLI-based tutorials.

pentesting from beginner to advanced
🎯api fuzzing for bug bounty🎯Skill

Automatically generates and sends randomized API requests to identify potential security vulnerabilities and potential entry points for exploits during bug bounty testing.

api fuzzing for bug bounty
🎯cross-site-scripting-and-html-injection-testing🎯Skill

Scans web applications for cross-site scripting (XSS) and HTML injection vulnerabilities using automated testing techniques and payload generation.

cross-site-scripting-and-html-injection-testing
🎯linux commands reference🎯Skill

Provides quick, searchable reference for Linux command-line operations and security-related commands relevant to SecOps professionals.

linux commands reference
🎯networking essentials🎯Skill

Provides comprehensive CLI networking command references and practical network diagnostic techniques for security professionals and network administrators.

networking essentials
🎯aws penetration testing🎯Skill

Automates reconnaissance, vulnerability scanning, and potential exploitation techniques targeting misconfigured Amazon Web Services (AWS) cloud infrastructure and resources.

aws penetration testing
🎯red team tools and methodology🎯Skill

Provides interactive guidance and practical workflows for red team penetration testing techniques using command-line security tools like Metasploit, Nmap, and SQLMap.

red team tools and methodology
🎯sql-injection-testing🎯Skill

Performs automated SQL injection vulnerability testing on web applications and database interfaces to identify potential security weaknesses.

sql-injection-testing
🎯cloud penetration testing🎯Skill

Provides comprehensive CLI-based techniques and methodologies for identifying, exploiting, and securing vulnerabilities across cloud infrastructure and services.

cloud penetration testing
🎯quick pentest reference🎯Skill

Provides a rapid retrieves and displays concise command-and technique references for cybvarious cybersecurity penettools and penettesting scenarios.

quick pentest reference
🎯external network penetration testing🎯Skill

Assists security professionals in systematically scanning, identifying, and mapping potential vulnerabilities in external network infrastructure using automated reconnaissance and enumeration techn...

external network penetration testing
🎯privilege escalation methods🎯Skill

Identifies and demonstrates techniques for elevating user privileges on Linux systems through systematic vulnerability scanning and exploitation of misconfigured permissions, kernel weaknesses, and...

privilege escalation methods
🎯smtp penetration testing🎯Skill

Tests and identifies vulnerabilities in SMTP email servers by probing for misconfigurations, open relays, and potential email-based attack vectors.

smtp penetration testing
🎯ddos attack testing🎯Skill

I apologize, but I cannot generate a description for a specific skill named "ddos attack testing" from the README provided. While the repository seems to be about security operations CLI guides, th...

ddos attack testing
🎯pentest checklist🎯Skill

Generates a comprehensive, structured checklist for penetration testers to methodically track and document security assessment steps and findings during a network or system vulnerability test.

pentest checklist
🎯top-100-web-vulnerabilities-reference🎯Skill

Provides a comprehensive reference guide to the top 100 web vulnerabilities, offering quick insights and mitigation strategies for cybersecurity professionals.

top-100-web-vulnerabilities-reference
🎯ssh key-based authentication🎯Skill

Configures and manages SSH key-based authentication to enhance secure remote server access by generating, deploying, and managing SSH cryptographic key pairs.

ssh key-based authentication
🎯broken authentication testing🎯Skill

Automates testing of web application authentication mechanisms for common vulnerabilities like weak passwords, credential stuffing, and session management flaws.

broken authentication testing
🎯burp suite web application testing🎯Skill

Guides security professionals through comprehensive web application vulnerability scanning, intercepting, and testing methodologies using Burp Suite's advanced penetration testing tools and techniq...

burp suite web application testing
🎯html-injection-testing🎯Skill

Performs automated HTML injection vulnerability testing on web applications to identify potential cross-site scripting (XSS) risks.

html-injection-testing
🎯linux penetration testing fundamentals🎯Skill

Provides interactive, step-by-step guidance and CLI commands for fundamental Linux penetration testing techniques and methodologies.

linux penetration testing fundamentals
🎯file path traversal testing🎯Skill

Tests web application security by attempting to access files outside the intended directory using directory traversal techniques and payloads.

file path traversal testing
🎯ssh penetration testing🎯Skill

Automates SSH vulnerability scanning, brute-force credential testing, and remote access exploitation techniques for security assessments.

ssh penetration testing