shodan-reconnaissance-and-pentesting
This skill should be used when the user asks to "search for exposed devices on the internet," "pe...
Description
This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan reconnaissance," "find vulnerable services using Shodan," "scan IP ranges with Shodan," or "discover IoT devices and open ports." It provides comprehensive guidance for using Shodan's search engine, CLI, and API for penetration testing reconnaissance.
Skill File
Tags
Information
You Might Also Like
Defi Protocol Templates
Implement DeFi protocols with production-ready templates for staking, AMMs, governance, and lendi...
Nft Standards
Implement NFT standards (ERC-721, ERC-1155) with proper metadata handling, minting strategies, an...
Solidity Security
Master smart contract security best practices to prevent common vulnerabilities and implement sec...
Web3 Testing
Test smart contracts comprehensively using Hardhat and Foundry with unit tests, integration tests...
Mtls Configuration
Configure mutual TLS (mTLS) for zero-trust service-to-service communication
Auth Implementation Patterns
Master authentication and authorization patterns including JWT, OAuth2, session management, and R...