pentest-cve-vulnerability-research-helper

Installation
SKILL.md

CVE Exploit Search Helper v2

Purpose

Use this skill to find, validate, deduplicate, rank, and explain vulnerability intelligence for a product, version, component, exploit artifact, or CVE ID. It is tool-aware for vulnx, but still works with web search alone when vulnx is unavailable.

When To Use

  • A CVE is known and you need affected products, exploit maturity, technical details, and verification steps.
  • A product, package, CPE, vendor, or version is known and you need relevant CVEs.
  • A feature, endpoint, DLL, module, protocol, port, or vulnerability class is known and you need likely CVEs tied to it.
  • You need to decide whether a vulnerability is theoretical, public-PoC, KEV-listed, or scanner-actionable.
  • You need a concise evidence trail for risk-based vulnerability assessment.

Operating Contract

  • Separate confirmed, likely, and rejected results.
  • Distinguish pre-auth from post-auth when relevant.
  • Prefer exact identifiers first, then product/version, then product family, then vulnerability class.
  • Keep commands minimal and reproducible; use placeholders for listener IPs, credentials, and target values.
  • Do not run exploit traffic against a live target unless scope and authorization are explicit.
Related skills

More from crtvrffnrt/skills

Installs
7
GitHub Stars
1
First Seen
Apr 28, 2026