{"id":"752018bb-b7e2-4b51-9e85-e507280a280d","shortId":"MTp9D2","kind":"skill","title":"scanning-tools","tagline":"Master essential security scanning tools for network discovery, vulnerability assessment, web application testing, wireless security, and compliance validation. This skill covers tool selection, configuration, and practical usage across different scanning categories.","description":"# Security Scanning Tools\n\n## Purpose\n\nMaster essential security scanning tools for network discovery, vulnerability assessment, web application testing, wireless security, and compliance validation. This skill covers tool selection, configuration, and practical usage across different scanning categories.\n\n## Prerequisites\n\n### Required Environment\n- Linux-based system (Kali Linux recommended)\n- Network access to target systems\n- Proper authorization for scanning activities\n\n### Required Knowledge\n- Basic networking concepts (TCP/IP, ports, protocols)\n- Understanding of common vulnerabilities\n- Familiarity with command-line interfaces\n\n## Outputs and Deliverables\n\n1. **Network Discovery Reports** - Identified hosts, ports, and services\n2. **Vulnerability Assessment Reports** - CVEs, misconfigurations, risk ratings\n3. **Web Application Security Reports** - OWASP Top 10 findings\n4. **Compliance Reports** - CIS benchmarks, PCI-DSS, HIPAA checks\n\n## Core Workflow\n\n### Phase 1: Network Scanning Tools\n\n#### Nmap (Network Mapper)\n\nPrimary tool for network discovery and security auditing:\n\n```bash\n# Host discovery\nnmap -sn 192.168.1.0/24              # Ping scan (no port scan)\nnmap -sL 192.168.1.0/24              # List scan (DNS resolution)\nnmap -Pn 192.168.1.100               # Skip host discovery\n\n# Port scanning techniques\nnmap -sS 192.168.1.100               # TCP SYN scan (stealth)\nnmap -sT 192.168.1.100               # TCP connect scan\nnmap -sU 192.168.1.100               # UDP scan\nnmap -sA 192.168.1.100               # ACK scan (firewall detection)\n\n# Port specification\nnmap -p 80,443 192.168.1.100         # Specific ports\nnmap -p- 192.168.1.100               # All 65535 ports\nnmap -p 1-1000 192.168.1.100         # Port range\nnmap --top-ports 100 192.168.1.100   # Top 100 common ports\n\n# Service and OS detection\nnmap -sV 192.168.1.100               # Service version detection\nnmap -O 192.168.1.100                # OS detection\nnmap -A 192.168.1.100                # Aggressive (OS, version, scripts)\n\n# Timing and performance\nnmap -T0 192.168.1.100               # Paranoid (slowest, IDS evasion)\nnmap -T4 192.168.1.100               # Aggressive (faster)\nnmap -T5 192.168.1.100               # Insane (fastest)\n\n# NSE Scripts\nnmap --script=vuln 192.168.1.100     # Vulnerability scripts\nnmap --script=http-enum 192.168.1.100  # Web enumeration\nnmap --script=smb-vuln* 192.168.1.100  # SMB vulnerabilities\nnmap --script=default 192.168.1.100  # Default script set\n\n# Output formats\nnmap -oN scan.txt 192.168.1.100      # Normal output\nnmap -oX scan.xml 192.168.1.100      # XML output\nnmap -oG scan.gnmap 192.168.1.100    # Grepable output\nnmap -oA scan 192.168.1.100          # All formats\n```\n\n#### Masscan\n\nHigh-speed port scanning for large networks:\n\n```bash\n# Basic scanning\nmasscan -p80 192.168.1.0/24 --rate=1000\nmasscan -p80,443,8080 192.168.1.0/24 --rate=10000\n\n# Full port range\nmasscan -p0-65535 192.168.1.0/24 --rate=5000\n\n# Large-scale scanning\nmasscan 0.0.0.0/0 -p443 --rate=100000 --excludefile exclude.txt\n\n# Output formats\nmasscan -p80 192.168.1.0/24 -oG results.gnmap\nmasscan -p80 192.168.1.0/24 -oJ results.json\nmasscan -p80 192.168.1.0/24 -oX results.xml\n\n# Banner grabbing\nmasscan -p80 192.168.1.0/24 --banners\n```\n\n### Phase 2: Vulnerability Scanning Tools\n\n#### Nessus\n\nEnterprise-grade vulnerability assessment:\n\n```bash\n# Start Nessus service\nsudo systemctl start nessusd\n\n# Access web interface\n# https://localhost:8834\n\n# Command-line (nessuscli)\nnessuscli scan --create --name \"Internal Scan\" --targets 192.168.1.0/24\nnessuscli scan --list\nnessuscli scan --launch <scan_id>\nnessuscli report --format pdf --output report.pdf <scan_id>\n```\n\nKey Nessus features:\n- Comprehensive CVE detection\n- Compliance checks (PCI-DSS, HIPAA, CIS)\n- Custom scan templates\n- Credentialed scanning for deeper analysis\n- Regular plugin updates\n\n#### OpenVAS (Greenbone)\n\nOpen-source vulnerability scanning:\n\n```bash\n# Install OpenVAS\nsudo apt install openvas\nsudo gvm-setup\n\n# Start services\nsudo gvm-start\n\n# Access web interface (Greenbone Security Assistant)\n# https://localhost:9392\n\n# Command-line operations\ngvm-cli socket --xml \"<get_version/>\"\ngvm-cli socket --xml \"<get_tasks/>\"\n\n# Create and run scan\ngvm-cli socket --xml '\n<create_target>\n  <name>Test Target</name>\n  <hosts>192.168.1.0/24</hosts>\n</create_target>'\n```\n\n### Phase 3: Web Application Scanning Tools\n\n#### Burp Suite\n\nComprehensive web application testing:\n\n```\n# Proxy configuration\n1. Set browser proxy to 127.0.0.1:8080\n2. Import Burp CA certificate for HTTPS\n3. Add target to scope\n\n# Key modules:\n- Proxy: Intercept and modify requests\n- Spider: Crawl web applications\n- Scanner: Automated vulnerability detection\n- Intruder: Automated attacks (fuzzing, brute-force)\n- Repeater: Manual request manipulation\n- Decoder: Encode/decode data\n- Comparer: Compare responses\n```\n\nCore testing workflow:\n1. Configure proxy and scope\n2. Spider the application\n3. Analyze sitemap\n4. Run active scanner\n5. Manual testing with Repeater/Intruder\n6. Review findings and generate report\n\n#### OWASP ZAP\n\nOpen-source web application scanner:\n\n```bash\n# Start ZAP\nzaproxy\n\n# Automated scan from CLI\nzap-cli quick-scan https://target.com\n\n# Full scan\nzap-cli spider https://target.com\nzap-cli active-scan https://target.com\n\n# Generate report\nzap-cli report -o report.html -f html\n\n# API mode\nzap.sh -daemon -port 8080 -config api.key=<your_key>\n```\n\nZAP automation:\n```bash\n# Docker-based scanning\ndocker run -t owasp/zap2docker-stable zap-full-scan.py \\\n  -t https://target.com -r report.html\n\n# Baseline scan (passive only)\ndocker run -t owasp/zap2docker-stable zap-baseline.py \\\n  -t https://target.com -r report.html\n```\n\n#### Nikto\n\nWeb server vulnerability scanner:\n\n```bash\n# Basic scan\nnikto -h https://target.com\n\n# Scan specific port\nnikto -h target.com -p 8080\n\n# Scan with SSL\nnikto -h target.com -ssl\n\n# Multiple targets\nnikto -h targets.txt\n\n# Output formats\nnikto -h target.com -o report.html -Format html\nnikto -h target.com -o report.xml -Format xml\nnikto -h target.com -o report.csv -Format csv\n\n# Tuning options\nnikto -h target.com -Tuning 123456789  # All tests\nnikto -h target.com -Tuning x          # Exclude specific tests\n```\n\n### Phase 4: Wireless Scanning Tools\n\n#### Aircrack-ng Suite\n\nWireless network penetration testing:\n\n```bash\n# Check wireless interface\nairmon-ng\n\n# Enable monitor mode\nsudo airmon-ng start wlan0\n\n# Scan for networks\nsudo airodump-ng wlan0mon\n\n# Capture specific network\nsudo airodump-ng -c <channel> --bssid <target_bssid> -w capture wlan0mon\n\n# Deauthentication attack\nsudo aireplay-ng -0 10 -a <bssid> wlan0mon\n\n# Crack WPA handshake\naircrack-ng -w wordlist.txt -b <bssid> capture*.cap\n\n# Crack WEP\naircrack-ng -b <bssid> capture*.cap\n```\n\n#### Kismet\n\nPassive wireless detection:\n\n```bash\n# Start Kismet\nkismet\n\n# Specify interface\nkismet -c wlan0\n\n# Access web interface\n# http://localhost:2501\n\n# Detect hidden networks\n# Kismet passively collects all beacon frames\n# including those from hidden SSIDs\n```\n\n### Phase 5: Malware and Exploit Scanning\n\n#### ClamAV\n\nOpen-source antivirus scanning:\n\n```bash\n# Update virus definitions\nsudo freshclam\n\n# Scan directory\nclamscan -r /path/to/scan\n\n# Scan with verbose output\nclamscan -r -v /path/to/scan\n\n# Move infected files\nclamscan -r --move=/quarantine /path/to/scan\n\n# Remove infected files\nclamscan -r --remove /path/to/scan\n\n# Scan specific file types\nclamscan -r --include='\\.exe$|\\.dll$' /path/to/scan\n\n# Output to log\nclamscan -r -l scan.log /path/to/scan\n```\n\n#### Metasploit Vulnerability Validation\n\nValidate vulnerabilities with exploitation:\n\n```bash\n# Start Metasploit\nmsfconsole\n\n# Database setup\nmsfdb init\ndb_status\n\n# Import Nmap results\ndb_import /path/to/nmap_scan.xml\n\n# Vulnerability scanning\nuse auxiliary/scanner/smb/smb_ms17_010\nset RHOSTS 192.168.1.0/24\nrun\n\n# Auto exploitation\nvulns                           # View vulnerabilities\nanalyze                         # Suggest exploits\n```\n\n### Phase 6: Cloud Security Scanning\n\n#### Prowler (AWS)\n\nAWS security assessment:\n\n```bash\n# Install Prowler\npip install prowler\n\n# Basic scan\nprowler aws\n\n# Specific checks\nprowler aws -c iam s3 ec2\n\n# Compliance framework\nprowler aws --compliance cis_aws\n\n# Output formats\nprowler aws -M html json csv\n\n# Specific region\nprowler aws -f us-east-1\n\n# Assume role\nprowler aws -R arn:aws:iam::123456789012:role/ProwlerRole\n```\n\n#### ScoutSuite (Multi-cloud)\n\nMulti-cloud security auditing:\n\n```bash\n# Install ScoutSuite\npip install scoutsuite\n\n# AWS scan\nscout aws\n\n# Azure scan\nscout azure --cli\n\n# GCP scan\nscout gcp --user-account\n\n# Generate report\nscout aws --report-dir ./reports\n```\n\n### Phase 7: Compliance Scanning\n\n#### Lynis\n\nSecurity auditing for Unix/Linux:\n\n```bash\n# Run audit\nsudo lynis audit system\n\n# Quick scan\nsudo lynis audit system --quick\n\n# Specific profile\nsudo lynis audit system --profile server\n\n# Output report\nsudo lynis audit system --report-file /tmp/lynis-report.dat\n\n# Check specific section\nsudo lynis show profiles\nsudo lynis audit system --tests-from-group malware\n```\n\n#### OpenSCAP\n\nSecurity compliance scanning:\n\n```bash\n# List available profiles\noscap info /usr/share/xml/scap/ssg/content/ssg-<distro>-ds.xml\n\n# Run scan with profile\noscap xccdf eval --profile xccdf_org.ssgproject.content_profile_pci-dss \\\n  --report report.html \\\n  /usr/share/xml/scap/ssg/content/ssg-rhel8-ds.xml\n\n# Generate fix script\noscap xccdf generate fix \\\n  --profile xccdf_org.ssgproject.content_profile_pci-dss \\\n  --output remediation.sh \\\n  /usr/share/xml/scap/ssg/content/ssg-rhel8-ds.xml\n```\n\n### Phase 8: Scanning Methodology\n\nStructured scanning approach:\n\n1. **Planning**\n   - Define scope and objectives\n   - Obtain proper authorization\n   - Select appropriate tools\n\n2. **Discovery**\n   - Host discovery (Nmap ping sweep)\n   - Port scanning\n   - Service enumeration\n\n3. **Vulnerability Assessment**\n   - Automated scanning (Nessus/OpenVAS)\n   - Web application scanning (Burp/ZAP)\n   - Manual verification\n\n4. **Analysis**\n   - Correlate findings\n   - Eliminate false positives\n   - Prioritize by severity\n\n5. **Reporting**\n   - Document findings\n   - Provide remediation guidance\n   - Executive summary\n\n### Phase 9: Tool Selection Guide\n\nChoose the right tool for each scenario:\n\n| Scenario | Recommended Tools |\n|----------|-------------------|\n| Network Discovery | Nmap, Masscan |\n| Vulnerability Assessment | Nessus, OpenVAS |\n| Web App Testing | Burp Suite, ZAP, Nikto |\n| Wireless Security | Aircrack-ng, Kismet |\n| Malware Detection | ClamAV, YARA |\n| Cloud Security | Prowler, ScoutSuite |\n| Compliance | Lynis, OpenSCAP |\n| Protocol Analysis | Wireshark, tcpdump |\n\n### Phase 10: Reporting and Documentation\n\nGenerate professional reports:\n\n```bash\n# Nmap XML to HTML\nxsltproc nmap-output.xml -o report.html\n\n# OpenVAS report export\ngvm-cli socket --xml '<get_reports report_id=\"<id>\" format_id=\"<pdf_format>\"/>'\n\n# Combine multiple scan results\n# Use tools like Faraday, Dradis, or custom scripts\n\n# Executive summary template:\n# 1. Scope and methodology\n# 2. Key findings summary\n# 3. Risk distribution chart\n# 4. Critical vulnerabilities\n# 5. Remediation recommendations\n# 6. Detailed technical findings\n```\n\n## Quick Reference\n\n### Nmap Cheat Sheet\n\n| Scan Type | Command |\n|-----------|---------|\n| Ping Scan | `nmap -sn <target>` |\n| Quick Scan | `nmap -T4 -F <target>` |\n| Full Scan | `nmap -p- <target>` |\n| Service Scan | `nmap -sV <target>` |\n| OS Detection | `nmap -O <target>` |\n| Aggressive | `nmap -A <target>` |\n| Vuln Scripts | `nmap --script=vuln <target>` |\n| Stealth Scan | `nmap -sS -T2 <target>` |\n\n### Common Ports Reference\n\n| Port | Service |\n|------|---------|\n| 21 | FTP |\n| 22 | SSH |\n| 23 | Telnet |\n| 25 | SMTP |\n| 53 | DNS |\n| 80 | HTTP |\n| 443 | HTTPS |\n| 445 | SMB |\n| 3306 | MySQL |\n| 3389 | RDP |\n\n## Constraints and Limitations\n\n### Legal Considerations\n- Always obtain written authorization\n- Respect scope boundaries\n- Follow responsible disclosure practices\n- Comply with local laws and regulations\n\n### Technical Limitations\n- Some scans may trigger IDS/IPS alerts\n- Heavy scanning can impact network performance\n- False positives require manual verification\n- Encrypted traffic may limit analysis\n\n### Best Practices\n- Start with non-intrusive scans\n- Gradually increase scan intensity\n- Document all scanning activities\n- Validate findings before reporting\n\n## Troubleshooting\n\n### Scan Not Detecting Hosts\n\n**Solutions:**\n1. Try different discovery methods: `nmap -Pn` or `nmap -sn -PS/PA/PU`\n2. Check firewall rules blocking ICMP\n3. Use TCP SYN scan: `nmap -PS22,80,443`\n4. Verify network connectivity\n\n### Slow Scan Performance\n\n**Solutions:**\n1. Increase timing: `nmap -T4` or `-T5`\n2. Reduce port range: `--top-ports 100`\n3. Use Masscan for initial discovery\n4. Disable DNS resolution: `-n`\n\n### Web Scanner Missing Vulnerabilities\n\n**Solutions:**\n1. Authenticate to access protected areas\n2. Increase crawl depth\n3. Add custom injection points\n4. Use multiple tools for coverage\n5. Perform manual testing\n\n## When to Use\nThis skill is applicable to execute the workflow or actions described in the overview.","tags":["scanning","tools","antigravity","awesome","skills","sickn33","agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding","ai-workflows"],"capabilities":["skill","source-sickn33","skill-scanning-tools","topic-agent-skills","topic-agentic-skills","topic-ai-agent-skills","topic-ai-agents","topic-ai-coding","topic-ai-workflows","topic-antigravity","topic-antigravity-skills","topic-claude-code","topic-claude-code-skills","topic-codex-cli","topic-codex-skills"],"categories":["antigravity-awesome-skills"],"synonyms":[],"warnings":[],"endpointUrl":"https://skills.sh/sickn33/antigravity-awesome-skills/scanning-tools","protocol":"skill","transport":"skills-sh","auth":{"type":"none","details":{"cli":"npx skills add sickn33/antigravity-awesome-skills","source_repo":"https://github.com/sickn33/antigravity-awesome-skills","install_from":"skills.sh"}},"qualityScore":"0.700","qualityRationale":"deterministic score 0.70 from registry signals: · indexed on github topic:agent-skills · 34583 github stars · SKILL.md body (13,221 chars)","verified":false,"liveness":"unknown","lastLivenessCheck":null,"agentReviews":{"count":0,"score_avg":null,"cost_usd_avg":null,"success_rate":null,"latency_p50_ms":null,"narrative_summary":null,"summary_updated_at":null},"enrichmentModel":"deterministic:skill-github:v1","enrichmentVersion":1,"enrichedAt":"2026-04-22T18:52:10.686Z","embedding":null,"createdAt":"2026-04-18T21:43:54.038Z","updatedAt":"2026-04-22T18:52:10.686Z","lastSeenAt":"2026-04-22T18:52:10.686Z","tsv":"'-0':862 '-1000':237 '-65535':381 '/0':392 '/24':171,180,365,373,383,403,409,415,423,461,556,1011 '/path/to/nmap_scan.xml':1003 '/path/to/scan':939,947,955,962,972,980 '/quarantine':954 '/reports':1121 '/tmp/lynis-report.dat':1162 '/usr/share/xml/scap/ssg/content/ssg-':1189 '/usr/share/xml/scap/ssg/content/ssg-rhel8-ds.xml':1206,1222 '0.0.0.0':391 '1':111,150,236,571,625,1072,1230,1375,1536,1570,1601 '10':135,863,1336 '100':245,248,1584 '1000':367 '10000':375 '100000':395 '123456789':796 '123456789012':1081 '127.0.0.1':576 '192.168.1.0':170,179,364,372,382,402,408,414,422,460,555,1010 '192.168.1.100':187,196,203,209,214,225,230,238,246,257,263,268,278,285,290,298,306,314,320,329,335,341,347 '2':120,426,578,630,1242,1379,1547,1577,1607 '21':1444 '22':1446 '23':1448 '25':1450 '2501':902 '3':128,558,585,634,1253,1383,1553,1585,1611 '3306':1460 '3389':1462 '4':137,637,808,1265,1387,1562,1591,1616 '443':224,370,1456,1561 '445':1458 '5':641,918,1275,1390,1622 '5000':385 '53':1452 '6':646,1022,1393 '65535':232 '7':1123 '8':1224 '80':223,1454,1560 '8080':371,577,704,754 '8834':448 '9':1285 '9392':529 'access':81,444,522,898,1604 'account':1113 'ack':215 'across':31,66 'action':1638 'activ':89,639,686,1525 'active-scan':685 'add':586,1612 'aggress':269,286,1426 'aircrack':813,870,880,1317 'aircrack-ng':812,869,879,1316 'aireplay':860 'aireplay-ng':859 'airmon':825,832 'airmon-ng':824,831 'airodump':841,849 'airodump-ng':840,848 'alert':1493 'alway':1469 'analysi':494,1266,1332,1509 'analyz':635,1018 'antivirus':927 'api':699 'api.key':706 'app':1308 'applic':15,50,130,560,567,600,633,658,1260,1632 'approach':1229 'appropri':1240 'apt':509 'area':1606 'arn':1078 'assess':13,48,122,435,1030,1255,1304 'assist':527 'assum':1073 'attack':607,857 'audit':164,1091,1128,1133,1136,1142,1149,1157,1172 'authent':1602 'author':86,1238,1472 'auto':1013 'autom':602,606,664,708,1256 'auxiliary/scanner/smb/smb_ms17_010':1007 'avail':1185 'aw':1027,1028,1040,1044,1052,1055,1059,1067,1076,1079,1098,1101,1117 'azur':1102,1105 'b':874,882 'banner':418,424 'base':75,712 'baselin':723 'bash':165,359,436,505,660,709,741,820,889,929,988,1031,1092,1131,1183,1343 'basic':92,360,742,1037 'beacon':910 'benchmark':141 'best':1510 'block':1551 'boundari':1475 'browser':573 'brute':610 'brute-forc':609 'bssid':852 'burp':563,580,1310 'burp/zap':1262 'c':851,896,1045 'ca':581 'cap':876,884 'captur':844,854,875,883 'categori':34,69 'certif':582 'chart':1386 'cheat':1400 'check':146,481,821,1042,1163,1548 'choos':1289 'cis':140,486,1054 'clamav':923,1322 'clamscan':937,944,951,959,967,976 'cli':536,541,550,667,670,679,684,693,1106,1357 'cloud':1023,1086,1089,1324 'collect':908 'combin':1360 'command':105,450,531,1404 'command-lin':104,449,530 'common':100,249,1439 'compar':619,620 'compli':1480 'complianc':20,55,138,480,1049,1053,1124,1181,1328 'comprehens':477,565 'concept':94 'config':705 'configur':27,62,570,626 'connect':205,1565 'consider':1468 'constraint':1464 'core':147,622 'correl':1267 'cover':24,59 'coverag':1621 'crack':866,877 'crawl':598,1609 'creat':455,544 'credenti':490 'critic':1388 'csv':789,1063 'custom':487,1370,1613 'cve':478 'cves':124 'daemon':702 'data':618 'databas':992 'db':996,1001 'deauthent':856 'decod':616 'deeper':493 'default':319,321 'defin':1232 'definit':932 'deliver':110 'depth':1610 'describ':1639 'detail':1394 'detect':218,254,260,265,479,604,888,903,1321,1423,1533 'differ':32,67,1538 'dir':1120 'directori':936 'disabl':1592 'disclosur':1478 'discoveri':11,46,113,161,167,190,1243,1245,1300,1539,1590 'distribut':1385 'dll':971 'dns':183,1453,1593 'docker':711,714,727 'docker-bas':710 'document':1277,1339,1522 'dradi':1368 'ds.xml':1190 'dss':144,484,1203,1219 'east':1071 'ec2':1048 'elimin':1269 'enabl':827 'encode/decode':617 'encrypt':1505 'enterpris':432 'enterprise-grad':431 'enum':305 'enumer':308,1252 'environ':72 'essenti':5,40 'eval':1197 'evas':282 'exclud':804 'exclude.txt':397 'excludefil':396 'exe':970 'execut':1282,1372,1634 'exploit':921,987,1014,1020 'export':1354 'f':697,1068,1413 'fals':1270,1500 'familiar':102 'faraday':1367 'faster':287 'fastest':292 'featur':476 'file':950,958,965,1161 'find':136,648,1268,1278,1381,1396,1527 'firewal':217,1549 'fix':1208,1213 'follow':1476 'forc':611 'format':325,349,399,470,768,774,781,788,1057 'frame':911 'framework':1050 'freshclam':934 'ftp':1445 'full':376,675,1414 'fuzz':608 'gcp':1107,1110 'generat':650,689,1114,1207,1212,1340 'grab':419 'grade':433 'gradual':1518 'greenbon':499,525 'grepabl':342 'group':1177 'guid':1288 'guidanc':1281 'gvm':514,520,535,540,549,1356 'gvm-cli':534,539,548,1355 'gvm-setup':513 'gvm-start':519 'h':745,751,759,765,770,777,784,793,800 'handshak':868 'heavi':1494 'hidden':904,915 'high':352 'high-spe':351 'hipaa':145,485 'host':116,166,189,1244,1534 'html':698,775,1061,1347 'http':304,1455 'http-enum':303 'https':584,1457 'iam':1046,1080 'icmp':1552 'id':281 'identifi':115 'ids/ips':1492 'impact':1497 'import':579,998,1002 'includ':912,969 'increas':1519,1571,1608 'infect':949,957 'info':1188 'init':995 'initi':1589 'inject':1614 'insan':291 'instal':506,510,1032,1035,1093,1096 'intens':1521 'intercept':593 'interfac':107,446,524,823,894,900 'intern':457 'intrud':605 'intrus':1516 'json':1062 'kali':77 'key':474,590,1380 'kismet':885,891,892,895,906,1319 'knowledg':91 'l':978 'larg':357,387 'large-scal':386 'launch':467 'law':1483 'legal':1467 'like':1366 'limit':1466,1487,1508 'line':106,451,532 'linux':74,78 'linux-bas':73 'list':181,464,1184 'local':1482 'localhost':447,528,901 'log':975 'lyni':1126,1135,1141,1148,1156,1167,1171,1329 'm':1060 'malwar':919,1178,1320 'manipul':615 'manual':613,642,1263,1503,1624 'mapper':156 'masscan':350,362,368,379,390,400,406,412,420,1302,1587 'master':4,39 'may':1490,1507 'metasploit':981,990 'method':1540 'methodolog':1226,1378 'misconfigur':125 'miss':1598 'mode':700,829 'modifi':595 'modul':591 'monitor':828 'move':948,953 'msfconsol':991 'msfdb':994 'multi':1085,1088 'multi-cloud':1084,1087 'multipl':762,1361,1618 'mysql':1461 'n':1595 'name':456 'nessus':430,438,475,1305 'nessus/openvas':1258 'nessusc':452,453,462,465,468 'nessusd':443 'network':10,45,80,93,112,151,155,160,358,817,838,846,905,1299,1498,1564 'ng':814,826,833,842,850,861,871,881,1318 'nikto':736,744,750,758,764,769,776,783,792,799,1313 'nmap':154,168,177,185,194,201,207,212,221,228,234,241,255,261,266,276,283,288,295,301,309,317,326,332,338,344,999,1246,1301,1344,1399,1407,1411,1416,1420,1424,1427,1431,1436,1541,1544,1558,1573 'nmap-output.xml':1349 'non':1515 'non-intrus':1514 'normal':330 'nse':293 'o':262,695,772,779,786,1350,1425 'oa':345 'object':1235 'obtain':1236,1470 'og':339,404 'oj':410 'open':501,655,925 'open-sourc':500,654,924 'openscap':1179,1330 'openva':498,507,511,1306,1352 'oper':533 'option':791 'os':253,264,270,1422 'oscap':1187,1195,1210 'output':108,324,331,337,343,398,472,767,943,973,1056,1153,1220 'overview':1642 'owasp':133,652 'owasp/zap2docker-stable':717,730 'ox':333,416 'p':222,229,235,753,1417 'p0':380 'p443':393 'p80':363,369,401,407,413,421 'paranoid':279 'passiv':725,886,907 'pci':143,483,1202,1218 'pci-dss':142,482,1201,1217 'pdf':471 'penetr':818 'perform':275,1499,1568,1623 'phase':149,425,557,807,917,1021,1122,1223,1284,1335 'ping':172,1247,1405 'pip':1034,1095 'plan':1231 'plugin':496 'pn':186,1542 'point':1615 'port':96,117,175,191,219,227,233,239,244,250,354,377,703,749,1249,1440,1442,1579,1583 'posit':1271,1501 'practic':29,64,1479,1511 'prerequisit':70 'primari':157 'priorit':1272 'profession':1341 'profil':1146,1151,1169,1186,1194,1198,1200,1214,1216 'proper':85,1237 'protect':1605 'protocol':97,1331 'provid':1279 'prowler':1026,1033,1036,1039,1043,1051,1058,1066,1075,1326 'proxi':569,574,592,627 'ps/pa/pu':1546 'ps22':1559 'purpos':38 'quick':672,1138,1144,1397,1409 'quick-scan':671 'r':721,734,938,945,952,960,968,977,1077 'rang':240,378,1580 'rate':127,366,374,384,394 'rdp':1463 'recommend':79,1297,1392 'reduc':1578 'refer':1398,1441 'region':1065 'regul':1485 'regular':495 'remedi':1280,1391 'remediation.sh':1221 'remov':956,961 'repeat':612 'repeater/intruder':645 'report':114,123,132,139,469,651,690,694,1115,1119,1154,1160,1204,1276,1337,1342,1353,1529 'report-dir':1118 'report-fil':1159 'report.csv':787 'report.html':696,722,735,773,1205,1351 'report.pdf':473 'report.xml':780 'request':596,614 'requir':71,90,1502 'resolut':184,1594 'respect':1473 'respons':621,1477 'result':1000,1363 'results.gnmap':405 'results.json':411 'results.xml':417 'review':647 'rhost':1009 'right':1291 'risk':126,1384 'role':1074 'role/prowlerrole':1082 'rule':1550 'run':546,638,715,728,1012,1132,1191 's3':1047 'sa':213 'scale':388 'scan':2,7,33,36,42,68,88,152,173,176,182,192,199,206,211,216,346,355,361,389,428,454,458,463,466,488,491,504,547,561,665,673,676,687,713,724,743,747,755,810,836,922,928,935,940,963,1005,1025,1038,1099,1103,1108,1125,1139,1182,1192,1225,1228,1250,1257,1261,1362,1402,1406,1410,1415,1419,1435,1489,1495,1517,1520,1524,1531,1557,1567 'scan.gnmap':340 'scan.log':979 'scan.txt':328 'scan.xml':334 'scanner':601,640,659,740,1597 'scanning-tool':1 'scenario':1295,1296 'scope':589,629,1233,1376,1474 'scout':1100,1104,1109,1116 'scoutsuit':1083,1094,1097,1327 'script':272,294,296,300,302,310,318,322,1209,1371,1430,1432 'section':1165 'secur':6,18,35,41,53,131,163,526,1024,1029,1090,1127,1180,1315,1325 'select':26,61,1239,1287 'server':738,1152 'servic':119,251,258,439,517,1251,1418,1443 'set':323,572,1008 'setup':515,993 'sever':1274 'sheet':1401 'show':1168 'sitemap':636 'skill':23,58,1630 'skill-scanning-tools' 'skip':188 'sl':178 'slow':1566 'slowest':280 'smb':312,315,1459 'smb-vuln':311 'smtp':1451 'sn':169,1408,1545 'socket':537,542,551,1358 'solut':1535,1569,1600 'sourc':502,656,926 'source-sickn33' 'specif':220,226,748,805,845,964,1041,1064,1145,1164 'specifi':893 'speed':353 'spider':597,631,680 'ss':195,1437 'ssh':1447 'ssid':916 'ssl':757,761 'st':202 'start':437,442,516,521,661,834,890,989,1512 'status':997 'stealth':200,1434 'structur':1227 'su':208 'sudo':440,508,512,518,830,839,847,858,933,1134,1140,1147,1155,1166,1170 'suggest':1019 'suit':564,815,1311 'summari':1283,1373,1382 'sv':256,1421 'sweep':1248 'syn':198,1556 'system':76,84,1137,1143,1150,1158,1173 'systemctl':441 't0':277 't2':1438 't4':284,1412,1574 't5':289,1576 'target':83,459,554,587,763 'target.com':674,681,688,720,733,746,752,760,771,778,785,794,801 'targets.txt':766 'tcp':197,204,1555 'tcp/ip':95 'tcpdump':1334 'technic':1395,1486 'techniqu':193 'telnet':1449 'templat':489,1374 'test':16,51,553,568,623,643,798,806,819,1175,1309,1625 'tests-from-group':1174 'time':273,1572 'tool':3,8,25,37,43,60,153,158,429,562,811,1241,1286,1292,1298,1365,1619 'top':134,243,247,1582 'top-port':242,1581 'topic-agent-skills' 'topic-agentic-skills' 'topic-ai-agent-skills' 'topic-ai-agents' 'topic-ai-coding' 'topic-ai-workflows' 'topic-antigravity' 'topic-antigravity-skills' 'topic-claude-code' 'topic-claude-code-skills' 'topic-codex-cli' 'topic-codex-skills' 'traffic':1506 'tri':1537 'trigger':1491 'troubleshoot':1530 'tune':790,795,802 'type':966,1403 'udp':210 'understand':98 'unix/linux':1130 'updat':497,930 'us':1070 'us-east':1069 'usag':30,65 'use':1006,1364,1554,1586,1617,1628 'user':1112 'user-account':1111 'v':946 'valid':21,56,983,984,1526 'verbos':942 'verif':1264,1504 'verifi':1563 'version':259,271 'view':1016 'virus':931 'vuln':297,313,1015,1429,1433 'vulner':12,47,101,121,299,316,427,434,503,603,739,982,985,1004,1017,1254,1303,1389,1599 'w':853,872 'web':14,49,129,307,445,523,559,566,599,657,737,899,1259,1307,1596 'wep':878 'wireless':17,52,809,816,822,887,1314 'wireshark':1333 'wlan0':835,897 'wlan0mon':843,855,865 'wordlist.txt':873 'workflow':148,624,1636 'wpa':867 'written':1471 'x':803 'xccdf':1196,1211 'xccdf_org.ssgproject.content':1199,1215 'xml':336,538,543,552,782,1345,1359 'xsltproc':1348 'yara':1323 'zap':653,662,669,678,683,692,707,1312 'zap-baseline.py':731 'zap-c':668,677,682,691 'zap-full-scan.py':718 'zap.sh':701 'zaproxi':663","prices":[{"id":"7b9fa513-b58b-474e-995d-c44f876a978c","listingId":"752018bb-b7e2-4b51-9e85-e507280a280d","amountUsd":"0","unit":"free","nativeCurrency":null,"nativeAmount":null,"chain":null,"payTo":null,"paymentMethod":"skill-free","isPrimary":true,"details":{"org":"sickn33","category":"antigravity-awesome-skills","install_from":"skills.sh"},"createdAt":"2026-04-18T21:43:54.038Z"}],"sources":[{"listingId":"752018bb-b7e2-4b51-9e85-e507280a280d","source":"github","sourceId":"sickn33/antigravity-awesome-skills/scanning-tools","sourceUrl":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/scanning-tools","isPrimary":false,"firstSeenAt":"2026-04-18T21:43:54.038Z","lastSeenAt":"2026-04-22T18:52:10.686Z"}],"details":{"listingId":"752018bb-b7e2-4b51-9e85-e507280a280d","quickStartSnippet":null,"exampleRequest":null,"exampleResponse":null,"schema":null,"openapiUrl":null,"agentsTxtUrl":null,"citations":[],"useCases":[],"bestFor":[],"notFor":[],"kindDetails":{"org":"sickn33","slug":"scanning-tools","github":{"repo":"sickn33/antigravity-awesome-skills","stars":34583,"topics":["agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding","ai-workflows","antigravity","antigravity-skills","claude-code","claude-code-skills","codex-cli","codex-skills","cursor","cursor-skills","developer-tools","gemini-cli","gemini-skills","kiro","mcp","skill-library"],"license":"mit","html_url":"https://github.com/sickn33/antigravity-awesome-skills","pushed_at":"2026-04-22T06:40:00Z","description":"Installable GitHub library of 1,400+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and more. Includes installer CLI, bundles, workflows, and official/community skill collections.","skill_md_sha":"b04a37dac6d33c66ba8de19a46bf72cc3a2dbfc5","skill_md_path":"skills/scanning-tools/SKILL.md","default_branch":"main","skill_tree_url":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/scanning-tools"},"layout":"multi","source":"github","category":"antigravity-awesome-skills","frontmatter":{"name":"scanning-tools","description":"Master essential security scanning tools for network discovery, vulnerability assessment, web application testing, wireless security, and compliance validation. This skill covers tool selection, configuration, and practical usage across different scanning categories."},"skills_sh_url":"https://skills.sh/sickn33/antigravity-awesome-skills/scanning-tools"},"updatedAt":"2026-04-22T18:52:10.686Z"}}