什么是 red-team-tools?
当用户要求“遵循红队方法论”、“执行错误赏金狩猎”、“自动侦察”、“寻找 XSS 漏洞”、“枚举苏... 来源:sickn33/antigravity-awesome-skills。
当用户要求“遵循红队方法论”、“执行错误赏金狩猎”、“自动侦察”、“寻找 XSS 漏洞”、“枚举苏...
通过命令行快速安装 red-team-tools AI 技能到你的开发环境
来源:sickn33/antigravity-awesome-skills。
Implement proven methodologies and tool workflows from top security researchers for effective reconnaissance, vulnerability discovery, and bug bounty hunting. Automate common tasks while maintaining thorough coverage of attack surfaces.
| Amass | Subdomain enumeration | | Subfinder | Fast subdomain discovery | | httpx/httprobe | Live host detection | | ffuf | Content discovery | | Nuclei | Vulnerability scanning | | Burp Suite | Manual testing | | Dalfox | XSS automation | | waybackurls | Historical URL mining |
| Rate limited | Use proxy rotation, reduce concurrency | | Too many results | Focus on specific technology stacks | | False positives | Manually verify findings before reporting | | Missing subdomains | Combine multiple enumeration sources | | API key errors | Verify keys in config files | | Tools not found | Install Go tools with go install |
为搜索与 AI 引用准备的稳定字段与命令。
npx skills add https://github.com/sickn33/antigravity-awesome-skills --skill red-team-tools当用户要求“遵循红队方法论”、“执行错误赏金狩猎”、“自动侦察”、“寻找 XSS 漏洞”、“枚举苏... 来源:sickn33/antigravity-awesome-skills。
打开你的终端或命令行工具(如 Terminal、iTerm、Windows Terminal 等) 复制并运行以下命令:npx skills add https://github.com/sickn33/antigravity-awesome-skills --skill red-team-tools 安装完成后,技能将自动配置到你的 AI 编程环境中,可以在 Claude Code、Cursor 或 OpenClaw 中使用
https://github.com/sickn33/antigravity-awesome-skills