recon-for-sec

Entry P1 category router for reconnaissance and methodology. Use when mapping scope, discovering assets, fingerprinting technology, building endpoint inventory, and choosing the first high-value security testing path.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "recon-for-sec" with this command: npx skills add yaklang/hack-skills/yaklang-hack-skills-recon-for-sec

Recon and Methodology Router

This is the starting router for new targets and unknown attack surfaces.

When to Use

  • You just received a new target and do not yet know what to test first
  • You need to begin with asset discovery, tech fingerprinting, endpoint inventory, and test-route planning
  • You want to build follow-up testing on structured methodology instead of random payload enumeration

Skill Map

Recommended Flow

  1. First confirm in-scope assets and target type
  2. Then perform asset discovery, port/service identification, technology fingerprinting, and endpoint collection
  3. Route based on collected findings to api-sec, auth-sec, injection-checking, or business-logic-vuln

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

websocket-security

No summary provided by upstream source.

Repository SourceNeeds Review
General

hack

No summary provided by upstream source.

Repository SourceNeeds Review
General

api-sec

No summary provided by upstream source.

Repository SourceNeeds Review
General

api-auth-and-jwt-abuse

No summary provided by upstream source.

Repository SourceNeeds Review