跳到主要内容

社区作者

SnailSploit

GitHub Skill Author | |

Auto-discovered GitHub author from SnailSploit/Claude-Red.

githubagent skills
作者聚焦2 个技能

github.com/SnailSploit

已发布技能

他们在 Skill Market 上维护的内容。

策展复核尚未完成 - 安装前请谨慎检查。
Skill 与 Agent 搭建中风险需复核

offensive-iot

IoT and embedded device security testing methodology. Covers hardware reconnaissance (UART, JTAG, SWD, SPI flash, I2C EEPROM, eMMC chip-off), firmware acquisition (vendor portals, OTA capture, flash dump, binwalk extraction), firmware analysis (filesystem mounting, binary triage, hardcoded secrets, default credential discovery), bootloader attacks (U-Boot console, secure-boot bypass, fault injection), runtime attacks on embedded Linux/RTOS (busybox CVEs, MTD writes, /dev/mem), wireless protocol attacks (Zigbee, BLE, Z-Wave, LoRaWAN, Thread/Matter, sub-GHz), MQTT/CoAP/Modbus/BACnet/OPC-UA exploitation, mobile companion app analysis, cloud-IoT API abuse, and side-channel/glitching basics. Use for IoT pentest, smart-home assessment, ICS/OT testing, or embedded vulnerability research.

4.2(8)1217 安装量更新 2026年5月9日
适合IoT and embedded device security testing methodology. Covers hardware reconnaissance (UART, JTAG, SWD, SPI flash, I2C EE
安装命令
适配Claude CodeCodex
查看源码
审计备注部分完成

尚未撰写编辑安全备注。

auto-discoveredgithubstar-1000-plus
策展复核尚未完成 - 安装前请谨慎检查。
Skill 与 Agent 搭建中风险需复核

offensive-active-directory

Active Directory attack methodology for internal network red team engagements. Covers reconnaissance (BloodHound, PowerView, ADExplorer), credential abuse (Kerberoasting, ASREProasting, NTLM relay, LLMNR/NBT-NS poisoning), privilege escalation (ACL abuse, GPO abuse, unconstrained/constrained delegation), lateral movement (Pass-the-Hash, Pass-the-Ticket, Overpass-the-Hash, WMI/WinRM/PsExec), persistence (Golden/Silver/Diamond Tickets, DCSync, DCShadow, AdminSDHolder, Skeleton Key), forest trust attacks, ADCS abuse (ESC1-ESC15), and modern MDI/Defender for Identity evasion. Use when assessing on-prem AD, hybrid AD/Entra ID environments, or ADCS deployments.

4.2(8)1217 安装量更新 2026年5月9日
适合Active Directory attack methodology for internal network red team engagements. Covers reconnaissance (BloodHound, PowerV
安装命令
适配Claude CodeCodex
查看源码
审计备注部分完成

尚未撰写编辑安全备注。

auto-discoveredgithubstar-1000-plus