web-exploits
Web vulnerability testing patterns for SQL injection, XSS, CSRF, LFI, SSTI, and file upload bypasses in CTF challenges. Trigger: When testing web applications, SQL injection, XSS, or file uploads.
Installation
SKILL.md
| SQL Injection | ', ' OR 1=1-- | ' UNION SELECT ... | | XSS | alert(1) | Cookie stealing, session hijacking | | LFI | ../../../etc/passwd | Read sensitive files, RCE via log poisoning | | SSTI | {{77}}, ${77} | RCE via template engine | | File Upload | Upload .php, .phtml | Web shell execution | | CSRF | No token validation | Force user actions |
| JWT | alg: none, weak secret | Privilege escalation |
web exploitation, SQL injection, SQLi, XSS, cross-site scripting, CSRF, LFI, RFI, local file inclusion, SSTI, template injection, file upload, webshell, JWT, JSON web token, command injection, path traversal, directory traversal, web security, OWASP, burp suite, requests, beautifulsoup
Web vulnerability testing patterns for SQL injection, XSS, CSRF, LFI, SSTI, and file upload bypasses in CTF challenges. Trigger: When testing web applications, SQL injection, XSS, or file uploads. Source: g36maid/ctf-arsenal.
Facts (cite-ready)
Stable fields and commands for AI/search citations.
- Install command
npx skills add https://github.com/g36maid/ctf-arsenal --skill web-exploits- Source
- g36maid/ctf-arsenal
- Category
- !Security
- Verified
- —
- First Seen
- 2026-02-11
- Updated
- 2026-02-18
Quick answers
What is web-exploits?
Web vulnerability testing patterns for SQL injection, XSS, CSRF, LFI, SSTI, and file upload bypasses in CTF challenges. Trigger: When testing web applications, SQL injection, XSS, or file uploads. Source: g36maid/ctf-arsenal.
How do I install web-exploits?
Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/g36maid/ctf-arsenal --skill web-exploits Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code or Cursor
Where is the source repository?
https://github.com/g36maid/ctf-arsenal
Details
- Category
- !Security
- Source
- user
- First Seen
- 2026-02-11