Cold Outreach — Free Methodology
Run a complete cold email outreach campaign — from sourcing leads to handling replies. Covers ICP definition, lead sourcing strategy, email sequence construc...
Network pivoting and tunneling for restricted environments. Sets up SOCKS proxies, Layer-3 tunnels, port forwarding, and multi-hop pivots when the attacker host can't directly reach internal targets. Covers chisel (HTTP-tunneled SOCKS5), ligolo-ng (TUN-based L3 tunnel — no proxychains required), SSH local/remote/dynamic forwarding, sshuttle, socat relays, Metasploit autoroute/portfwd, and proxychains4 configuration. Uses chisel, ligolo-ng (proxy + agent), msfvenom (agent dropper payloads), proxychains4, ssh, sshuttle, socat, and tmux for long-lived listeners. Chains from /post-exploit, /reverse-shell, or /lateral-movement when a foothold has been established but internal targets are not directly reachable from the attacker host.
This listing is imported from SkillsMP metadata and should be treated as untrusted until upstream source review is completed.
Install skill "pivoting" with this command: npx skills add w13rt/skillsmp-w13rt-w13rt-pivoting
This source entry does not include full markdown content beyond metadata.
This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.
Related by shared tags or category signals.
Run a complete cold email outreach campaign — from sourcing leads to handling replies. Covers ICP definition, lead sourcing strategy, email sequence construc...
Open identity and encrypted communication protocol for AI agents. Register on the Koan mesh, get a cryptographic identity, and send your first greeting.
Use this skill when the user asks for financial data ("price of BTC", "P/E ratio of NVDA"), market analysis, stock or crypto research, quant strategies, back...
Manage user intents through submission, validation, lifecycle tracking, cancellation, bidding, execution, and completion with cryptographic verification and...