mode-pentest
Installation
SKILL.md
Pentest Mode
Phases
| Phase | Actions | Tools |
|---|---|---|
| 1. Scope | Define targets, rules of engagement | Document |
| 2. Recon | Passive/Active info gathering | whois, dig, theHarvester |
| 3. Scan | Port scan, service enum, vuln scan | nmap, gobuster, nikto |
| 4. Exploit | Attempt exploitation | sqlmap, metasploit, manual |
| 5. Post | Privesc, lateral movement, persistence | linpeas, mimikatz |
| 6. Report | Document findings, recommendations | Markdown/PDF |
Quick Commands
# Recon
whois domain.com && dig domain.com ANY
nmap -sC -sV -oA scan TARGET
Related skills
More from duck4nh/antigravity-kit
linux-server-expert
>-
336pentest-expert
>-
179web-security-expert
>-
65exploit-dev-expert
>-
65webpack-expert
Webpack build optimization expert with deep knowledge of configuration patterns, bundle analysis, code splitting, module federation, performance optimization, and plugin/loader ecosystem. Use PROACTIVELY for any Webpack bundling issues including complex optimizations, build performance, custom plugins/loaders, and modern architecture patterns. If a specialized expert is a better fit, I will recommend switching and stop.
31mode-exploit
>-
19