·web-exploits
!

web-exploits

g36maid/ctf-arsenal

Web vulnerability testing patterns for SQL injection, XSS, CSRF, LFI, SSTI, and file upload bypasses in CTF challenges. Trigger: When testing web applications, SQL injection, XSS, or file uploads.

0Installs·0Trend·@g36maid

Installation

$npx skills add https://github.com/g36maid/ctf-arsenal --skill web-exploits

SKILL.md

| SQL Injection | ', ' OR 1=1-- | ' UNION SELECT ... | | XSS | alert(1) | Cookie stealing, session hijacking | | LFI | ../../../etc/passwd | Read sensitive files, RCE via log poisoning | | SSTI | {{77}}, ${77} | RCE via template engine | | File Upload | Upload .php, .phtml | Web shell execution | | CSRF | No token validation | Force user actions |

| JWT | alg: none, weak secret | Privilege escalation |

web exploitation, SQL injection, SQLi, XSS, cross-site scripting, CSRF, LFI, RFI, local file inclusion, SSTI, template injection, file upload, webshell, JWT, JSON web token, command injection, path traversal, directory traversal, web security, OWASP, burp suite, requests, beautifulsoup

Web vulnerability testing patterns for SQL injection, XSS, CSRF, LFI, SSTI, and file upload bypasses in CTF challenges. Trigger: When testing web applications, SQL injection, XSS, or file uploads. Source: g36maid/ctf-arsenal.

View raw

Facts (cite-ready)

Stable fields and commands for AI/search citations.

Install command
npx skills add https://github.com/g36maid/ctf-arsenal --skill web-exploits
Category
!Security
Verified
First Seen
2026-02-11
Updated
2026-02-18

Quick answers

What is web-exploits?

Web vulnerability testing patterns for SQL injection, XSS, CSRF, LFI, SSTI, and file upload bypasses in CTF challenges. Trigger: When testing web applications, SQL injection, XSS, or file uploads. Source: g36maid/ctf-arsenal.

How do I install web-exploits?

Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/g36maid/ctf-arsenal --skill web-exploits Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code or Cursor

Where is the source repository?

https://github.com/g36maid/ctf-arsenal

Details

Category
!Security
Source
user
First Seen
2026-02-11