Skip to main content
Source repository

sickn33/antigravity-awesome-skills

These skills were imported into SkillJury from the public skills ecosystem.

205 linked skillsVisit source
Source listing

205 imported skills

API Fuzzing for Bug Bounty

by sickn33/antigravity-awesome-skills

Provide comprehensive techniques for testing REST, SOAP, and GraphQL APIs during bug bounty hunting and penetration testing engagements. Covers vulnerability discovery, authentication bypass, IDOR exploitation, and API-specific attack vectors.

Software EngineeringFrontend and DesignFirst seen Dec 31, 1969

Broken Authentication Testing

by sickn33/antigravity-awesome-skills

Identify and exploit authentication and session management vulnerabilities in web applications. Broken authentication consistently ranks in the OWASP Top 10 and can lead to account takeover, identity theft, and unauthorized access to sensitive systems. This skill covers testing methodologies for password policies,...

Software EngineeringFrontend and DesignFirst seen Dec 31, 1969

Burp Suite Web Application Testing

by sickn33/antigravity-awesome-skills

Execute comprehensive web application security testing using Burp Suite's integrated toolset, including HTTP traffic interception and modification, request analysis and replay, automated vulnerability scanning, and manual testing workflows. This skill enables systematic discovery and exploitation of web application...

Software EngineeringFrontend and DesignFirst seen Dec 31, 1969

Cross-Site Scripting and HTML Injection Testing

by sickn33/antigravity-awesome-skills

Execute comprehensive client-side injection vulnerability assessments on web applications to identify XSS and HTML injection flaws, demonstrate exploitation techniques for session hijacking and credential theft, and validate input sanitization and output encoding mechanisms. This skill enables systematic detection and...

Software EngineeringFrontend and DesignFirst seen Dec 31, 1969

File Path Traversal Testing

by sickn33/antigravity-awesome-skills

Identify and exploit file path traversal (directory traversal) vulnerabilities that allow attackers to read arbitrary files on the server, potentially including sensitive configuration files, credentials, and source code. This vulnerability occurs when user-controllable input is passed to filesystem APIs without...

Software EngineeringFrontend and DesignFirst seen Dec 31, 1969

IDOR Vulnerability Testing

by sickn33/antigravity-awesome-skills

Provide systematic methodologies for identifying and exploiting Insecure Direct Object Reference (IDOR) vulnerabilities in web applications. This skill covers both database object references and static file references, detection techniques using parameter manipulation and enumeration, exploitation via Burp Suite, and...

Software EngineeringFrontend and DesignFirst seen Dec 31, 1969

Linux Production Shell Scripts

by sickn33/antigravity-awesome-skills

Provide production-ready shell script templates for common Linux system administration tasks including backups, monitoring, user management, log analysis, and automation. These scripts serve as building blocks for security operations and penetration testing environments.

Software EngineeringFrontend and DesignFirst seen Dec 31, 1969

Red Team Tools and Methodology

by sickn33/antigravity-awesome-skills

Implement proven methodologies and tool workflows from top security researchers for effective reconnaissance, vulnerability discovery, and bug bounty hunting. Automate common tasks while maintaining thorough coverage of attack surfaces.

Software EngineeringFrontend and DesignFirst seen Dec 31, 1969

scanning-tools

by sickn33/antigravity-awesome-skills

Master essential security scanning tools for network discovery, vulnerability assessment, web application testing, wireless security, and compliance validation. This skill covers tool selection, configuration, and practical usage across different scanning categories.

Software EngineeringFrontend and DesignFirst seen Dec 31, 1969

Shodan Reconnaissance and Pentesting

by sickn33/antigravity-awesome-skills

Provide systematic methodologies for leveraging Shodan as a reconnaissance tool during penetration testing engagements. This skill covers the Shodan web interface, command-line interface (CLI), REST API, search filters, on-demand scanning, and network monitoring capabilities for discovering exposed services,...

Software EngineeringFrontend and DesignFirst seen Dec 31, 1969

SQLMap Database Penetration Testing

by sickn33/antigravity-awesome-skills

Provide systematic methodologies for automated SQL injection detection and exploitation using SQLMap. This skill covers database enumeration, table and column discovery, data extraction, multiple target specification methods, and advanced exploitation techniques for MySQL, PostgreSQL, MSSQL, Oracle, and other database...

Software EngineeringFrontend and DesignFirst seen Dec 31, 1969

Top 100 Web Vulnerabilities Reference

by sickn33/antigravity-awesome-skills

Provide a comprehensive, structured reference for the 100 most critical web application vulnerabilities organized by category. This skill enables systematic vulnerability identification, impact assessment, and remediation guidance across the full spectrum of web security threats. Content organized into 15 major...

Software EngineeringFrontend and DesignFirst seen Dec 31, 1969

Wireshark Network Traffic Analysis

by sickn33/antigravity-awesome-skills

Execute comprehensive network traffic analysis using Wireshark to capture, filter, and examine network packets for security investigations, performance optimization, and troubleshooting. This skill enables systematic analysis of network protocols, detection of anomalies, and reconstruction of network conversations...

Software EngineeringFrontend and DesignFirst seen Dec 31, 1969
Page 9 of 9