Red Team Tools and Methodology

Installation
SKILL.md

Red Team Tools and Methodology

Purpose

Implement proven methodologies and tool workflows from top security researchers for effective reconnaissance, vulnerability discovery, and bug bounty hunting. Automate common tasks while maintaining thorough coverage of attack surfaces.

Inputs/Prerequisites

  • Target scope definition (domains, IP ranges, applications)
  • Linux-based attack machine (Kali, Ubuntu)
  • Bug bounty program rules and scope
  • Tool dependencies installed (Go, Python, Ruby)
  • API keys for various services (Shodan, Censys, etc.)

Outputs/Deliverables

  • Comprehensive subdomain enumeration
  • Live host discovery and technology fingerprinting
  • Identified vulnerabilities and attack vectors
Related skills
Installs
GitHub Stars
30
First Seen