skills/dokhacgiakhoa/antigravity-ide/Red Team Tools and Methodology

Red Team Tools and Methodology

SKILL.md

Red Team Tools and Methodology

Purpose

Implement proven methodologies and tool workflows from top security researchers for effective reconnaissance, vulnerability discovery, and bug bounty hunting. Automate common tasks while maintaining thorough coverage of attack surfaces.

Inputs/Prerequisites

  • Target scope definition (domains, IP ranges, applications)
  • Linux-based attack machine (Kali, Ubuntu)
  • Bug bounty program rules and scope
  • Tool dependencies installed (Go, Python, Ruby)
  • API keys for various services (Shodan, Censys, etc.)

Outputs/Deliverables

  • Comprehensive subdomain enumeration
  • Live host discovery and technology fingerprinting
  • Identified vulnerabilities and attack vectors
  • Automated recon pipeline outputs
  • Documented findings for reporting

Core Workflow

🧠 Knowledge Modules (Fractal Skills)

1. 1. Project Tracking and Acquisitions

2. 2. Subdomain Enumeration

3. 3. Live Host Discovery

4. 4. Technology Fingerprinting

5. 5. Content Discovery

6. 6. Application Analysis (Jason Haddix Method)

7. 7. Automated XSS Hunting

8. 8. Vulnerability Scanning

9. 9. API Enumeration

10. 10. Automated Recon Script

11. Essential Tools

12. Key API Endpoints to Check

13. XSS Filter Testing

14. Example 1: Quick Subdomain Recon

15. Example 2: XSS Hunting Pipeline

16. Example 3: Comprehensive Scan

Weekly Installs
0
GitHub Stars
384
First Seen
Jan 1, 1970