Pentest Commands
v1.0.1Essential penetration testing command reference. Quick lookup for nmap, Metasploit, hydra, john, nikto, gobuster, and other offensive security tools. Covers...
⭐ 0· 378·0 current·0 all-time
bySolomon Neas@solomonneas
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description match the content: the SKILL.md is a command reference for pentesting tools. No unrelated binaries, env vars, or installs are requested.
Instruction Scope
The instructions provide explicit offensive commands and example payloads (e.g., Metasploit/msfvenom, nmap NSE scripts). They assume an authorized pentest environment (Kali, authorized targets). They do not instruct the agent to read unrelated files, exfiltrate data, or call external endpoints beyond the described tools, but the content enables potentially harmful actions if executed on unauthorized targets.
Install Mechanism
No install spec and no code files — instruction-only skill; nothing is written to disk by an installer and no external download URLs are used.
Credentials
The skill requires no environment variables, credentials, or config paths. The SKILL.md lists prerequisites (Kali, target access, wordlists) that are relevant and proportional.
Persistence & Privilege
always is false and the skill does not request persistent or elevated platform privileges. It does not modify other skills or platform configs.
Assessment
This is a coherent reference cheat-sheet for penetration-testing tools (nmap, Metasploit, sqlmap, etc.). It does not request credentials or install anything, but the commands are offensive in nature — only run them in environments where you have explicit authorization. If you plan to enable autonomous invocation for an agent, be cautious: allowing automatic execution of these commands can cause legal and operational harm. Prefer manual invocation, run in isolated test networks (e.g., lab or VM), and keep logs and explicit authorization records before executing any scans or exploits.Like a lobster shell, security has layers — review code before you run it.
latestvk976xd30fx4ap4n8hjeprpy1mn838w1q
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
