ffuf-web-fuzzing
✓Expert guidance for ffuf web fuzzing during penetration testing, including authenticated fuzzing with raw requests, auto-calibration, and result analysis
Installation
SKILL.md
Overview FFUF is a fast web fuzzer written in Go, designed for discovering hidden content, directories, files, subdomains, and testing for vulnerabilities during penetration testing. It's significantly faster than traditional tools like dirb or dirbuster.
The FUZZ Keyword The FUZZ keyword is used as a placeholder that gets replaced with entries from your wordlist. You can place it anywhere:
Auto-Calibration (USE BY DEFAULT!) CRITICAL: Always use -ac unless you have a specific reason not to. This is especially important when having Claude analyze results, as it dramatically reduces noise and false positives.
Expert guidance for ffuf web fuzzing during penetration testing, including authenticated fuzzing with raw requests, auto-calibration, and result analysis Source: microck/ordinary-claude-skills.
Facts (cite-ready)
Stable fields and commands for AI/search citations.
- Install command
npx skills add https://github.com/microck/ordinary-claude-skills --skill ffuf-web-fuzzing- Category
- {}Data Analysis
- Verified
- ✓
- First Seen
- 2026-02-01
- Updated
- 2026-02-18
Quick answers
What is ffuf-web-fuzzing?
Expert guidance for ffuf web fuzzing during penetration testing, including authenticated fuzzing with raw requests, auto-calibration, and result analysis Source: microck/ordinary-claude-skills.
How do I install ffuf-web-fuzzing?
Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/microck/ordinary-claude-skills --skill ffuf-web-fuzzing Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code or Cursor
Where is the source repository?
https://github.com/microck/ordinary-claude-skills
Details
- Category
- {}Data Analysis
- Source
- skills.sh
- First Seen
- 2026-02-01