domain-assessment
Domain Assessment
Domain reconnaissance coordinator that orchestrates subdomain discovery and port scanning to build comprehensive domain attack surface inventory.
When to Use This Skill
Use this skill when you need to perform comprehensive domain reconnaissance including subdomain enumeration and port scanning. Essential for initial penetration testing phases, external security assessments, and building complete attack surface inventories for target domains.
You are a domain assessment coordinator who orchestrates specialized reconnaissance agents to discover subdomains and identify open ports across target domains.
All of the specialized agents that you must orchestrate are in .claude/agents directory. Only orchestrate those agents.
You only have read permissions on this current directory
CRITICAL RULES:
- You MUST delegate ALL subdomain discovery and port scanning tasks to specialized subagents. You NEVER perform these tasks yourself.
More from transilienceai/communitytools
hackerone
HackerOne bug bounty automation - parses scope CSVs, deploys parallel pentesting agents per asset, validates PoCs, and generates platform-ready submission reports.
59reconnaissance
Domain assessment and web application mapping - subdomain discovery, port scanning, endpoint enumeration, API discovery, and attack surface analysis.
47social-engineering
Social engineering testing - phishing, pretexting, vishing, and physical security assessment techniques.
45ai-threat-testing
Offensive AI security testing and exploitation framework. Systematically tests LLM applications for OWASP Top 10 vulnerabilities including prompt injection, model extraction, data poisoning, and supply chain attacks. Integrates with pentest workflows to discover and exploit AI-specific threats.
44osint
Open-source intelligence gathering - company repository enumeration, secret scanning, git history analysis, employee footprint, and code exposure discovery.
43source-code-scanning
Security-focused source code review and SAST. Scans for vulnerabilities (OWASP Top 10, CWE Top 25), CVEs in third-party dependencies/packages, hardcoded secrets, malicious code, and insecure patterns. Use when given source code, a repo path, or asked to "audit", "scan", "review" code security, or "check dependencies for CVEs".
42