Red Team Tools and Methodology
SKILL.md
Red Team Tools and Methodology
Purpose
Implement proven methodologies and tool workflows from top security researchers for effective reconnaissance, vulnerability discovery, and bug bounty hunting. Automate common tasks while maintaining thorough coverage of attack surfaces.
Inputs/Prerequisites
- Target scope definition (domains, IP ranges, applications)
- Linux-based attack machine (Kali, Ubuntu)
- Bug bounty program rules and scope
- Tool dependencies installed (Go, Python, Ruby)
- API keys for various services (Shodan, Censys, etc.)
Outputs/Deliverables
- Comprehensive subdomain enumeration
- Live host discovery and technology fingerprinting
- Identified vulnerabilities and attack vectors
- Automated recon pipeline outputs
- Documented findings for reporting
Core Workflow
🧠Knowledge Modules (Fractal Skills)
1. 1. Project Tracking and Acquisitions
2. 2. Subdomain Enumeration
3. 3. Live Host Discovery
4. 4. Technology Fingerprinting
5. 5. Content Discovery
6. 6. Application Analysis (Jason Haddix Method)
7. 7. Automated XSS Hunting
8. 8. Vulnerability Scanning
9. 9. API Enumeration
10. 10. Automated Recon Script
11. Essential Tools
12. Key API Endpoints to Check
13. XSS Filter Testing
14. Example 1: Quick Subdomain Recon
15. Example 2: XSS Hunting Pipeline
16. Example 3: Comprehensive Scan
Weekly Installs
0
Repository
dokhacgiakhoa/a…vity-ideGitHub Stars
384
First Seen
Jan 1, 1970
Security Audits