cybersecurity15 skillsadvanced

Web Application Pentesting

Full-cycle web application penetration testing from recon to report.

#pentest#web#security#owasp
This pack contains 15 skills in raw Markdown format. Download as a ZIP to use offline, or view each skill individually. Works with ChatGPT, Claude, Gemini, and all major LLMs.
In this Pack
15 items
Productivityunknown

sql-injection-testing

Execute comprehensive SQL injection vulnerability assessments on web applications to identify database security flaws, demonstrate exploitation techniques, and validate input sanitization mechanisms.

View Skill →
Productivityunknown

xss-html-injection

Execute comprehensive client-side injection vulnerability assessments on web applications to identify XSS and HTML injection flaws, demonstrate exploitation techniques for session hijacking and credential theft, and validate input sanitization and output encoding mechanisms.

View Skill →
Productivityunknown

idor-testing

Provide systematic methodologies for identifying and exploiting Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.

View Skill →
UI/UXunknown

linux-privilege-escalation

Execute systematic privilege escalation assessments on Linux systems to identify and exploit misconfigurations, vulnerable services, and security weaknesses that allow elevation from low-privilege user access to root-level control.

View Skill →
Productivity

Reverse Shell Payload Crafter

High-power cybersecurity assistant specializing in building stealthy callbacks for multi-os with deep technical knowledge.

View Skill →
Productivityoffensive

metasploit-framework

⚠️ AUTHORIZED USE ONLY > This skill is for educational purposes or authorized security assessments only. > You must have explicit, written permission from the system owner before using this tool. > Misuse of this tool is illegal and strictly prohibited.

View Skill →
Productivity

Nmap Network Recon Master

High-power cybersecurity assistant specializing in stealthy scanning and OS fingerprinting with deep technical knowledge.

View Skill →
Productivity

OSINT Investigator

High-power cybersecurity assistant specializing in digital footprinting and leak discovery with deep technical knowledge.

View Skill →
Productivityunknown

shodan-reconnaissance

Provide systematic methodologies for leveraging Shodan as a reconnaissance tool during penetration testing engagements.

View Skill →
Productivityunknown

SEC-087-pen-test-report-generator

Generated Analytical skill for Cybersecurity. Focuses on execution and intent intelligence.

View Skill →
Productivity

Pentesting Report Writer

High-power cybersecurity assistant specializing in turning technical findings into risk with deep technical knowledge.

View Skill →
Productivityunknown

SEC-009-cvss-score-calculator

Generated Conversational skill for Cybersecurity. Focuses on execution and intent intelligence.

View Skill →
UI/UXunknown

burp-suite-testing

Execute comprehensive web application security testing using Burp Suite's integrated toolset, including HTTP traffic interception and modification, request analysis and replay, automated vulnerability scanning, and manual testing workflows.

View Skill →
Productivityunknown

vulnerability-scanner

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

View Skill →
Productivityunknown

SEC-048-dast-scanner-setup

Generated Agentic skill for Cybersecurity. Focuses on execution and intent intelligence.

View Skill →
Workflow Breakdown

exploitation

  1. 01sql-injection-testing
  2. 02xss-html-injection
  3. 03idor-testing

post exploit

  1. 01linux-privilege-escalation
  2. 02reverse-shell-crafter
  3. 03metasploit-framework

recon

  1. 01nmap-recon-stealth-master
  2. 02osint-digital-footprint
  3. 03shodan-reconnaissance

reporting

  1. 01pen-test-report-generator
  2. 02pentest-report-writer-pro
  3. 03cvss-score-calculator

vulnerability scan

  1. 01burp-suite-testing
  2. 02vulnerability-scanner
  3. 03dast-scanner-setup