This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit vulnerabilities", or "write penetration test reports". It provides comprehensive ethical hacking methodology and techniques.
8.1
Rating
0
Installs
Security
Category
Excellent comprehensive ethical hacking skill with strong task knowledge covering the complete penetration testing lifecycle. The description clearly indicates when to use this skill (learning, reconnaissance, scanning, exploitation, reporting). The content provides extensive practical commands, tool usage, and methodologies that would be extremely useful for a CLI agent. Structure is generally good with clear phases and quick reference sections, though at 400+ lines it approaches the upper limit of single-file readability. Novelty is solid - consolidating this breadth of ethical hacking knowledge (reconnaissance techniques, Metasploit usage, reporting structures, legal guidelines) saves significant tokens versus a CLI agent researching each topic independently. Minor improvements could include splitting some phases into separate referenced files for even cleaner structure, but overall this is a highly useful, well-executed security skill.
Loading SKILL.md…