Web Application Pentesting
Full-cycle web application penetration testing from recon to report.
sql-injection-testing
Execute comprehensive SQL injection vulnerability assessments on web applications to identify database security flaws, demonstrate exploitation techniques, and validate input sanitization mechanisms.
xss-html-injection
Execute comprehensive client-side injection vulnerability assessments on web applications to identify XSS and HTML injection flaws, demonstrate exploitation techniques for session hijacking and credential theft, and validate input sanitization and output encoding mechanisms.
idor-testing
Provide systematic methodologies for identifying and exploiting Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
linux-privilege-escalation
Execute systematic privilege escalation assessments on Linux systems to identify and exploit misconfigurations, vulnerable services, and security weaknesses that allow elevation from low-privilege user access to root-level control.
Reverse Shell Payload Crafter
High-power cybersecurity assistant specializing in building stealthy callbacks for multi-os with deep technical knowledge.
metasploit-framework
⚠️ AUTHORIZED USE ONLY > This skill is for educational purposes or authorized security assessments only. > You must have explicit, written permission from the system owner before using this tool. > Misuse of this tool is illegal and strictly prohibited.
Nmap Network Recon Master
High-power cybersecurity assistant specializing in stealthy scanning and OS fingerprinting with deep technical knowledge.
OSINT Investigator
High-power cybersecurity assistant specializing in digital footprinting and leak discovery with deep technical knowledge.
shodan-reconnaissance
Provide systematic methodologies for leveraging Shodan as a reconnaissance tool during penetration testing engagements.
SEC-087-pen-test-report-generator
Generated Analytical skill for Cybersecurity. Focuses on execution and intent intelligence.
Pentesting Report Writer
High-power cybersecurity assistant specializing in turning technical findings into risk with deep technical knowledge.
SEC-009-cvss-score-calculator
Generated Conversational skill for Cybersecurity. Focuses on execution and intent intelligence.
burp-suite-testing
Execute comprehensive web application security testing using Burp Suite's integrated toolset, including HTTP traffic interception and modification, request analysis and replay, automated vulnerability scanning, and manual testing workflows.
vulnerability-scanner
Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.
SEC-048-dast-scanner-setup
Generated Agentic skill for Cybersecurity. Focuses on execution and intent intelligence.
exploitation
- 01sql-injection-testing
- 02xss-html-injection
- 03idor-testing
post exploit
- 01linux-privilege-escalation
- 02reverse-shell-crafter
- 03metasploit-framework
recon
- 01nmap-recon-stealth-master
- 02osint-digital-footprint
- 03shodan-reconnaissance
reporting
- 01pen-test-report-generator
- 02pentest-report-writer-pro
- 03cvss-score-calculator
vulnerability scan
- 01burp-suite-testing
- 02vulnerability-scanner
- 03dast-scanner-setup