Security testing toolkit for Claude Code with curated SecLists wordlists, injection payloads, and expert agents. Enables authorized pentesting, CTFs, and bug bounties for security teams and ethical hackers. Integrates with Claude Code for streamlined security assessments.
git clone https://github.com/Eyadkelleh/awesome-claude-skills-security.gitSecurity testing toolkit for Claude Code with curated SecLists wordlists, injection payloads, and expert agents. Enables authorized pentesting, CTFs, and bug bounties for security teams and ethical hackers. Integrates with Claude Code for streamlined security assessments.
No install command available. Check the GitHub repository for manual installation instructions.
git clone https://github.com/Eyadkelleh/awesome-claude-skills-securityCopy the install command above and run it in your terminal.
Launch Claude Code, Cursor, or your preferred AI coding agent.
Use the prompt template or examples below to test the skill.
Adapt the skill to your specific use case and workflow.
I'm conducting a security assessment for [COMPANY] in the [INDUSTRY] sector. I need to test for common vulnerabilities using the awesome-claude-skills-security toolkit. Please provide a tailored security testing plan using the SecLists wordlists and injection payloads. Focus on [SPECIFIC_SYSTEM_OR_APPLICATION] and include steps for post-exploitation analysis.
## Security Testing Plan for [COMPANY] in the [INDUSTRY] Sector ### 1. Reconnaissance Phase - **Target Identification**: [SPECIFIC_SYSTEM_OR_APPLICATION] - **Information Gathering**: Utilize SecLists wordlists for subdomain enumeration and directory brute-forcing. - **Tools**: Use the expert agents to automate the collection of publicly available information. ### 2. Vulnerability Scanning - **Injection Payloads**: Test for SQL injection, XSS, and CSRF vulnerabilities using curated payloads. - **Automated Scanning**: Leverage Claude Code to automate the scanning process and identify potential entry points. ### 3. Exploitation Phase - **Exploitation Attempts**: Execute controlled exploitation attempts to validate identified vulnerabilities. - **Post-Exploitation Analysis**: Document the impact and potential risks associated with each vulnerability. ### 4. Reporting - **Detailed Report**: Compile findings into a comprehensive report, including remediation steps and risk assessments.
AI assistant built for thoughtful, nuanced conversation
IronCalc is a spreadsheet engine and ecosystem
Service Management That Turns Chaos Into Control
Customer feedback management made simple
Enterprise workflow automation and service management platform
Automate your spreadsheet tasks with AI power