This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or needs security researcher techniques and tool configurations from top bug bounty hunters.
Add this skill
npx mdskills install sickn33/red-team-toolsComprehensive security testing workflows with proven tools and methodologies for bug bounty research
1---2name: Red Team Tools and Methodology3description: This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or needs security researcher techniques and tool configurations from top bug bounty hunters.4metadata:5 author: zebbern6 version: "1.1"7---89# Red Team Tools and Methodology1011## Purpose1213Implement proven methodologies and tool workflows from top security researchers for effective reconnaissance, vulnerability discovery, and bug bounty hunting. Automate common tasks while maintaining thorough coverage of attack surfaces.1415## Inputs/Prerequisites1617- Target scope definition (domains, IP ranges, applications)18- Linux-based attack machine (Kali, Ubuntu)19- Bug bounty program rules and scope20- Tool dependencies installed (Go, Python, Ruby)21- API keys for various services (Shodan, Censys, etc.)2223## Outputs/Deliverables2425- Comprehensive subdomain enumeration26- Live host discovery and technology fingerprinting27- Identified vulnerabilities and attack vectors28- Automated recon pipeline outputs29- Documented findings for reporting3031## Core Workflow3233### 1. Project Tracking and Acquisitions3435Set up reconnaissance tracking:3637```bash38# Create project structure39mkdir -p target/{recon,vulns,reports}40cd target4142# Find acquisitions using Crunchbase43# Search manually for subsidiary companies4445# Get ASN for targets46amass intel -org "Target Company" -src4748# Alternative ASN lookup49curl -s "https://bgp.he.net/search?search=targetcompany&commit=Search"50```5152### 2. Subdomain Enumeration5354Comprehensive subdomain discovery:5556```bash57# Create wildcards file58echo "target.com" > wildcards5960# Run Amass passively61amass enum -passive -d target.com -src -o amass_passive.txt6263# Run Amass actively64amass enum -active -d target.com -src -o amass_active.txt6566# Use Subfinder67subfinder -d target.com -silent -o subfinder.txt6869# Asset discovery70cat wildcards | assetfinder --subs-only | anew domains.txt7172# Alternative subdomain tools73findomain -t target.com -o7475# Generate permutations with dnsgen76cat domains.txt | dnsgen - | httprobe > permuted.txt7778# Combine all sources79cat amass_*.txt subfinder.txt | sort -u > all_subs.txt80```8182### 3. Live Host Discovery8384Identify responding hosts:8586```bash87# Check which hosts are live with httprobe88cat domains.txt | httprobe -c 80 --prefer-https | anew hosts.txt8990# Use httpx for more details91cat domains.txt | httpx -title -tech-detect -status-code -o live_hosts.txt9293# Alternative with massdns94massdns -r resolvers.txt -t A -o S domains.txt > resolved.txt95```9697### 4. Technology Fingerprinting9899Identify technologies for targeted attacks:100101```bash102# Whatweb scanning103whatweb -i hosts.txt -a 3 -v > tech_stack.txt104105# Nuclei technology detection106nuclei -l hosts.txt -t technologies/ -o tech_nuclei.txt107108# Wappalyzer (if available)109# Browser extension for manual review110```111112### 5. Content Discovery113114Find hidden endpoints and files:115116```bash117# Directory bruteforce with ffuf118ffuf -ac -v -u https://target.com/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt119120# Historical URLs from Wayback121waybackurls target.com | tee wayback.txt122123# Find all URLs with gau124gau target.com | tee all_urls.txt125126# Parameter discovery127cat all_urls.txt | grep "=" | sort -u > params.txt128129# Generate custom wordlist from historical data130cat all_urls.txt | unfurl paths | sort -u > custom_wordlist.txt131```132133### 6. Application Analysis (Jason Haddix Method)134135**Heat Map Priority Areas:**1361371. **File Uploads** - Test for injection, XXE, SSRF, shell upload1382. **Content Types** - Filter Burp for multipart forms1393. **APIs** - Look for hidden methods, lack of auth1404. **Profile Sections** - Stored XSS, custom fields1415. **Integrations** - SSRF through third parties1426. **Error Pages** - Exotic injection points143144**Analysis Questions:**145- How does the app pass data? (Params, API, Hybrid)146- Where does the app talk about users? (UID, UUID endpoints)147- Does the site have multi-tenancy or user levels?148- Does it have a unique threat model?149- How does the site handle XSS/CSRF?150- Has the site had past writeups/exploits?151152### 7. Automated XSS Hunting153154```bash155# ParamSpider for parameter extraction156python3 paramspider.py --domain target.com -o params.txt157158# Filter with Gxss159cat params.txt | Gxss -p test160161# Dalfox for XSS testing162cat params.txt | dalfox pipe --mining-dict params.txt -o xss_results.txt163164# Alternative workflow165waybackurls target.com | grep "=" | qsreplace '"><script>alert(1)</script>' | while read url; do166 curl -s "$url" | grep -q 'alert(1)' && echo "$url"167done > potential_xss.txt168```169170### 8. Vulnerability Scanning171172```bash173# Nuclei comprehensive scan174nuclei -l hosts.txt -t ~/nuclei-templates/ -o nuclei_results.txt175176# Check for common CVEs177nuclei -l hosts.txt -t cves/ -o cve_results.txt178179# Web vulnerabilities180nuclei -l hosts.txt -t vulnerabilities/ -o vuln_results.txt181```182183### 9. API Enumeration184185**Wordlists for API fuzzing:**186187```bash188# Enumerate API endpoints189ffuf -u https://target.com/api/FUZZ -w /usr/share/seclists/Discovery/Web-Content/api/api-endpoints.txt190191# Test API versions192ffuf -u https://target.com/api/v1/FUZZ -w api_wordlist.txt193ffuf -u https://target.com/api/v2/FUZZ -w api_wordlist.txt194195# Check for hidden methods196for method in GET POST PUT DELETE PATCH; do197 curl -X $method https://target.com/api/users -v198done199```200201### 10. Automated Recon Script202203```bash204#!/bin/bash205domain=$1206207if [[ -z $domain ]]; then208 echo "Usage: ./recon.sh <domain>"209 exit 1210fi211212mkdir -p "$domain"213214# Subdomain enumeration215echo "[*] Enumerating subdomains..."216subfinder -d "$domain" -silent > "$domain/subs.txt"217218# Live host discovery219echo "[*] Finding live hosts..."220cat "$domain/subs.txt" | httpx -title -tech-detect -status-code > "$domain/live.txt"221222# URL collection223echo "[*] Collecting URLs..."224cat "$domain/live.txt" | waybackurls > "$domain/urls.txt"225226# Nuclei scanning227echo "[*] Running Nuclei..."228nuclei -l "$domain/live.txt" -o "$domain/nuclei.txt"229230echo "[+] Recon complete!"231```232233## Quick Reference234235### Essential Tools236237| Tool | Purpose |238|------|---------|239| Amass | Subdomain enumeration |240| Subfinder | Fast subdomain discovery |241| httpx/httprobe | Live host detection |242| ffuf | Content discovery |243| Nuclei | Vulnerability scanning |244| Burp Suite | Manual testing |245| Dalfox | XSS automation |246| waybackurls | Historical URL mining |247248### Key API Endpoints to Check249250```251/api/v1/users252/api/v1/admin253/api/v1/profile254/api/users/me255/api/config256/api/debug257/api/swagger258/api/graphql259```260261### XSS Filter Testing262263```html264<!-- Test encoding handling -->265<h1><img><table>266<script>267%3Cscript%3E268%253Cscript%253E269%26lt;script%26gt;270```271272## Constraints273274- Respect program scope boundaries275- Avoid DoS or fuzzing on production without permission276- Rate limit requests to avoid blocking277- Some tools may generate false positives278- API keys required for full functionality of some tools279280## Examples281282### Example 1: Quick Subdomain Recon283284```bash285subfinder -d target.com | httpx -title | tee results.txt286```287288### Example 2: XSS Hunting Pipeline289290```bash291waybackurls target.com | grep "=" | qsreplace "test" | httpx -silent | dalfox pipe292```293294### Example 3: Comprehensive Scan295296```bash297# Full recon chain298amass enum -d target.com | httpx | nuclei -t ~/nuclei-templates/299```300301## Troubleshooting302303| Issue | Solution |304|-------|----------|305| Rate limited | Use proxy rotation, reduce concurrency |306| Too many results | Focus on specific technology stacks |307| False positives | Manually verify findings before reporting |308| Missing subdomains | Combine multiple enumeration sources |309| API key errors | Verify keys in config files |310| Tools not found | Install Go tools with `go install` |311
Full transparency — inspect the skill content before installing.