@rfxlamia/skillkit 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +16 -0
- package/agents/creative-copywriter.md +212 -0
- package/agents/dario-amodei.md +135 -0
- package/agents/doc-simplifier.md +63 -0
- package/agents/kotlin-pro.md +433 -0
- package/agents/red-team.md +136 -0
- package/agents/sam-altman.md +121 -0
- package/agents/seo-manager.md +184 -0
- package/bin/skillkit.js +3 -0
- package/package.json +35 -0
- package/skills/adversarial-review/SKILL.md +219 -0
- package/skills/baby-education/SKILL.md +260 -0
- package/skills/baby-education/references/advanced-techniques.md +323 -0
- package/skills/baby-education/references/transformations.md +345 -0
- package/skills/been-there-done-that/SKILL.md +455 -0
- package/skills/been-there-done-that/references/analysis-patterns.md +162 -0
- package/skills/been-there-done-that/references/git-commands.md +132 -0
- package/skills/been-there-done-that/references/tree-insertion-logic.md +145 -0
- package/skills/coolhunter/SKILL.md +270 -0
- package/skills/coolhunter/assets/elicitation-methods.csv +51 -0
- package/skills/coolhunter/knowledge/elicitation-methods.md +312 -0
- package/skills/coolhunter/references/workflow-execution.md +238 -0
- package/skills/coolhunter/workflow-plan-coolhunter.md +232 -0
- package/skills/creative-copywriting/SKILL.md +324 -0
- package/skills/creative-copywriting/databases/README.md +60 -0
- package/skills/creative-copywriting/databases/carousel-structures.csv +16 -0
- package/skills/creative-copywriting/databases/emotional-arcs.csv +11 -0
- package/skills/creative-copywriting/databases/hook-formulas.csv +51 -0
- package/skills/creative-copywriting/databases/power-words.csv +201 -0
- package/skills/creative-copywriting/databases/psychological-triggers.csv +21 -0
- package/skills/creative-copywriting/databases/read-more-patterns.csv +26 -0
- package/skills/creative-copywriting/databases/swipe-triggers.csv +31 -0
- package/skills/creative-copywriting/references/carousel-psychology.md +223 -0
- package/skills/creative-copywriting/references/hook-anatomy.md +169 -0
- package/skills/creative-copywriting/references/power-word-science.md +134 -0
- package/skills/creative-copywriting/references/storytelling-frameworks.md +157 -0
- package/skills/diverse-content-gen/SKILL.md +201 -0
- package/skills/diverse-content-gen/references/advanced-techniques.md +320 -0
- package/skills/diverse-content-gen/references/research-findings.md +379 -0
- package/skills/diverse-content-gen/references/task-workflows.md +241 -0
- package/skills/diverse-content-gen/references/tool-integration.md +419 -0
- package/skills/diverse-content-gen/references/troubleshooting.md +426 -0
- package/skills/diverse-content-gen/references/vs-core-technique.md +240 -0
- package/skills/framework-critical-thinking/SKILL.md +220 -0
- package/skills/framework-critical-thinking/references/bias_detector.md +375 -0
- package/skills/framework-critical-thinking/references/fallback_handler.md +239 -0
- package/skills/framework-critical-thinking/references/memory_curator.md +161 -0
- package/skills/framework-critical-thinking/references/metacognitive_monitor.md +297 -0
- package/skills/framework-critical-thinking/references/producer_critic_orchestrator.md +333 -0
- package/skills/framework-critical-thinking/references/reasoning_router.md +235 -0
- package/skills/framework-critical-thinking/references/reasoning_validator.md +97 -0
- package/skills/framework-critical-thinking/references/reflection_trigger.md +78 -0
- package/skills/framework-critical-thinking/references/self_verification.md +388 -0
- package/skills/framework-critical-thinking/references/uncertainty_quantifier.md +207 -0
- package/skills/framework-initiative/SKILL.md +231 -0
- package/skills/framework-initiative/references/examples.md +150 -0
- package/skills/framework-initiative/references/impact-analysis.md +157 -0
- package/skills/framework-initiative/references/intent-patterns.md +145 -0
- package/skills/framework-initiative/references/star-framework.md +165 -0
- package/skills/humanize-docs/SKILL.md +203 -0
- package/skills/humanize-docs/references/advanced-techniques.md +13 -0
- package/skills/humanize-docs/references/core-transformations.md +368 -0
- package/skills/humanize-docs/references/detection-patterns.md +400 -0
- package/skills/humanize-docs/references/examples-gallery.md +374 -0
- package/skills/imagine/SKILL.md +190 -0
- package/skills/imagine/references/artstyle-corporate-memphis.md +625 -0
- package/skills/imagine/references/artstyle-crewdson-hyperrealism.md +295 -0
- package/skills/imagine/references/artstyle-iphone-social-media.md +426 -0
- package/skills/imagine/references/artstyle-sciencesaru.md +276 -0
- package/skills/pre-deploy-checklist/README.md +26 -0
- package/skills/pre-deploy-checklist/SKILL.md +153 -0
- package/skills/pre-deploy-checklist/references/checklist-categories.md +174 -0
- package/skills/pre-deploy-checklist/references/domain-prompts.md +216 -0
- package/skills/prompt-engineering/SKILL.md +209 -0
- package/skills/prompt-engineering/references/advanced-combinations.md +444 -0
- package/skills/prompt-engineering/references/chain-of-thought.md +140 -0
- package/skills/prompt-engineering/references/decision_matrix.md +220 -0
- package/skills/prompt-engineering/references/few-shot.md +346 -0
- package/skills/prompt-engineering/references/json-format.md +270 -0
- package/skills/prompt-engineering/references/natural-language.md +420 -0
- package/skills/prompt-engineering/references/pitfalls.md +365 -0
- package/skills/prompt-engineering/references/prompt-chaining.md +498 -0
- package/skills/prompt-engineering/references/react.md +108 -0
- package/skills/prompt-engineering/references/self-consistency.md +322 -0
- package/skills/prompt-engineering/references/tree-of-thoughts.md +386 -0
- package/skills/prompt-engineering/references/xml-format.md +220 -0
- package/skills/prompt-engineering/references/yaml-format.md +488 -0
- package/skills/prompt-engineering/references/zero-shot.md +74 -0
- package/skills/quick-spec/SKILL.md +280 -0
- package/skills/quick-spec/assets/tech-spec-template.md +74 -0
- package/skills/quick-spec/references/step-01-understand.md +189 -0
- package/skills/quick-spec/references/step-02-investigate.md +144 -0
- package/skills/quick-spec/references/step-03-generate.md +128 -0
- package/skills/quick-spec/references/step-04-review.md +173 -0
- package/skills/quick-spec/tests/test_scenarios.md +83 -0
- package/skills/quick-spec/tests/test_skill.py +136 -0
- package/skills/readme-expert/SKILL.md +538 -0
- package/skills/readme-expert/knowledge/INDEX.md +192 -0
- package/skills/readme-expert/knowledge/application/quality-standards.md +470 -0
- package/skills/readme-expert/knowledge/application/script-executor.md +604 -0
- package/skills/readme-expert/knowledge/application/template-library.md +822 -0
- package/skills/readme-expert/knowledge/foundation/codebase-scanner.md +361 -0
- package/skills/readme-expert/knowledge/foundation/validation-checklist.md +481 -0
- package/skills/red-teaming/SKILL.md +321 -0
- package/skills/red-teaming/references/ai-llm-redteam.md +517 -0
- package/skills/red-teaming/references/attack-techniques.md +410 -0
- package/skills/red-teaming/references/cybersecurity-redteam.md +383 -0
- package/skills/red-teaming/references/tools-frameworks.md +446 -0
- package/skills/releasing/.skillkit-mode +1 -0
- package/skills/releasing/SKILL.md +225 -0
- package/skills/releasing/references/version-detection.md +108 -0
- package/skills/screenwriter/SKILL.md +273 -0
- package/skills/screenwriter/references/advanced-techniques.md +216 -0
- package/skills/screenwriter/references/pipeline-integration.md +266 -0
- package/skills/skillkit/.claude-plugin/plugin.json +27 -0
- package/skills/skillkit/CHANGELOG.md +484 -0
- package/skills/skillkit/SKILL.md +511 -0
- package/skills/skillkit/commands/skillkit.md +6 -0
- package/skills/skillkit/commands/validate-plan.md +6 -0
- package/skills/skillkit/commands/verify.md +6 -0
- package/skills/skillkit/knowledge/INDEX.md +352 -0
- package/skills/skillkit/knowledge/application/09-case-studies.md +257 -0
- package/skills/skillkit/knowledge/application/10-technical-architecture.md +324 -0
- package/skills/skillkit/knowledge/application/11-adoption-strategy.md +267 -0
- package/skills/skillkit/knowledge/application/12-testing-and-validation.md +276 -0
- package/skills/skillkit/knowledge/application/13-competitive-landscape.md +198 -0
- package/skills/skillkit/knowledge/foundation/01-why-skills-exist.md +246 -0
- package/skills/skillkit/knowledge/foundation/02-skills-vs-subagents-comparison.md +312 -0
- package/skills/skillkit/knowledge/foundation/03-skills-vs-subagents-decision-tree.md +346 -0
- package/skills/skillkit/knowledge/foundation/04-hybrid-patterns.md +308 -0
- package/skills/skillkit/knowledge/foundation/05-token-economics.md +275 -0
- package/skills/skillkit/knowledge/foundation/06-platform-constraints.md +237 -0
- package/skills/skillkit/knowledge/foundation/07-security-concerns.md +322 -0
- package/skills/skillkit/knowledge/foundation/08-when-not-to-use-skills.md +270 -0
- package/skills/skillkit/knowledge/plugin-guide.md +614 -0
- package/skills/skillkit/knowledge/tools/14-validation-tools-guide.md +150 -0
- package/skills/skillkit/knowledge/tools/15-cost-tools-guide.md +157 -0
- package/skills/skillkit/knowledge/tools/16-security-tools-guide.md +122 -0
- package/skills/skillkit/knowledge/tools/17-pattern-tools-guide.md +161 -0
- package/skills/skillkit/knowledge/tools/18-decision-helper-guide.md +243 -0
- package/skills/skillkit/knowledge/tools/19-test-generator-guide.md +275 -0
- package/skills/skillkit/knowledge/tools/20-split-skill-guide.md +149 -0
- package/skills/skillkit/knowledge/tools/21-quality-scorer-guide.md +226 -0
- package/skills/skillkit/knowledge/tools/22-migration-helper-guide.md +356 -0
- package/skills/skillkit/knowledge/tools/23-subagent-creation-guide.md +448 -0
- package/skills/skillkit/knowledge/tools/24-behavioral-testing-guide.md +122 -0
- package/skills/skillkit/references/proposal-generation.md +982 -0
- package/skills/skillkit/references/rationalization-catalog.md +75 -0
- package/skills/skillkit/references/research-methodology.md +661 -0
- package/skills/skillkit/references/section-2-full-creation-workflow.md +452 -0
- package/skills/skillkit/references/section-3-validation-workflow-existing-skill.md +63 -0
- package/skills/skillkit/references/section-4-decision-workflow-skills-vs-subagents.md +64 -0
- package/skills/skillkit/references/section-5-migration-workflow-doc-to-skill.md +58 -0
- package/skills/skillkit/references/section-6-subagent-creation-workflow.md +499 -0
- package/skills/skillkit/references/section-7-knowledge-reference-map.md +72 -0
- package/skills/skillkit/scripts/decision_helper.py +799 -0
- package/skills/skillkit/scripts/init_skill.py +400 -0
- package/skills/skillkit/scripts/init_subagent.py +231 -0
- package/skills/skillkit/scripts/migration_helper.py +669 -0
- package/skills/skillkit/scripts/package_skill.py +211 -0
- package/skills/skillkit/scripts/pattern_detector.py +381 -0
- package/skills/skillkit/scripts/pattern_detector_new.py +382 -0
- package/skills/skillkit/scripts/pressure_tester.py +157 -0
- package/skills/skillkit/scripts/quality_scorer.py +999 -0
- package/skills/skillkit/scripts/quick_validate.py +100 -0
- package/skills/skillkit/scripts/security_scanner.py +474 -0
- package/skills/skillkit/scripts/split_skill.py +540 -0
- package/skills/skillkit/scripts/test_generator.py +695 -0
- package/skills/skillkit/scripts/token_estimator.py +493 -0
- package/skills/skillkit/scripts/utils/__init__.py +49 -0
- package/skills/skillkit/scripts/utils/budget_tracker.py +388 -0
- package/skills/skillkit/scripts/utils/output_formatter.py +263 -0
- package/skills/skillkit/scripts/utils/reference_validator.py +401 -0
- package/skills/skillkit/scripts/validate_skill.py +594 -0
- package/skills/skillkit/tests/test_behavioral.py +39 -0
- package/skills/skillkit/tests/test_scenarios.md +83 -0
- package/skills/skillkit/tests/test_skill.py +136 -0
- package/skills/social-media-seo/SKILL.md +278 -0
- package/skills/social-media-seo/databases/caption-styles.csv +31 -0
- package/skills/social-media-seo/databases/engagement-tactics.csv +16 -0
- package/skills/social-media-seo/databases/hashtag-strategies.csv +21 -0
- package/skills/social-media-seo/databases/hook-formulas.csv +26 -0
- package/skills/social-media-seo/databases/keyword-clusters.csv +11 -0
- package/skills/social-media-seo/databases/thread-structures.csv +26 -0
- package/skills/social-media-seo/databases/viral-patterns.csv +21 -0
- package/skills/social-media-seo/references/analytics-guide.md +321 -0
- package/skills/social-media-seo/references/instagram-seo.md +235 -0
- package/skills/social-media-seo/references/threads-seo.md +305 -0
- package/skills/social-media-seo/references/x-twitter-seo.md +337 -0
- package/skills/social-media-seo/scripts/query_database.py +191 -0
- package/skills/storyteller/SKILL.md +241 -0
- package/skills/storyteller/references/transformation-methodology.md +293 -0
- package/skills/storyteller/references/visual-vocabulary.md +177 -0
- package/skills/thread-pro/SKILL.md +162 -0
- package/skills/thread-pro/anti-ai-patterns.md +120 -0
- package/skills/thread-pro/hook-formulas.md +138 -0
- package/skills/thread-pro/references/anti-ai-patterns.md +120 -0
- package/skills/thread-pro/references/hook-formulas.md +138 -0
- package/skills/thread-pro/references/thread-structures.md +240 -0
- package/skills/thread-pro/references/voice-injection.md +130 -0
- package/skills/thread-pro/thread-structures.md +240 -0
- package/skills/thread-pro/voice-injection.md +130 -0
- package/skills/tinkering/SKILL.md +251 -0
- package/skills/tinkering/references/graduation-checklist.md +100 -0
- package/skills/validate-plan/.skillkit-mode +1 -0
- package/skills/validate-plan/SKILL.md +406 -0
- package/skills/validate-plan/references/dry-principles.md +251 -0
- package/skills/validate-plan/references/gap-analysis-guide.md +320 -0
- package/skills/validate-plan/references/tdd-patterns.md +413 -0
- package/skills/validate-plan/references/yagni-checklist.md +330 -0
- package/skills/verify-before-ship/.skillkit-mode +1 -0
- package/skills/verify-before-ship/SKILL.md +116 -0
- package/skills/verify-before-ship/references/anti-rationalization.md +212 -0
- package/skills/verify-before-ship/references/verification-gates.md +305 -0
- package/skills-manifest.json +217 -0
- package/src/banner.js +10 -0
- package/src/cli.js +30 -0
- package/src/install.js +53 -0
- package/src/install.test.js +40 -0
- package/src/picker.js +74 -0
- package/src/picker.test.js +21 -0
- package/src/scope.js +57 -0
- package/src/scope.test.js +19 -0
- package/src/update.js +34 -0
- package/src/update.test.js +24 -0
|
@@ -0,0 +1,446 @@
|
|
|
1
|
+
# Tools & Frameworks Reference
|
|
2
|
+
|
|
3
|
+
## Table of Contents
|
|
4
|
+
|
|
5
|
+
1. [Overview](#overview)
|
|
6
|
+
2. [MITRE ATT&CK Ecosystem](#mitre-attck-ecosystem)
|
|
7
|
+
3. [Command & Control (C2) Frameworks](#command--control-c2-frameworks)
|
|
8
|
+
4. [Exploitation Frameworks](#exploitation-frameworks)
|
|
9
|
+
5. [Credential Attacks](#credential-attacks)
|
|
10
|
+
6. [Phishing & Social Engineering](#phishing--social-engineering)
|
|
11
|
+
7. [OSINT & Reconnaissance](#osint--reconnaissance)
|
|
12
|
+
8. [AI/LLM Red Teaming Tools](#aillm-red-teaming-tools)
|
|
13
|
+
9. [Network Security Tools](#network-security-tools)
|
|
14
|
+
10. [Defensive Tools (Blue Team)](#defensive-tools-blue-team)
|
|
15
|
+
11. [Tool Selection Criteria](#tool-selection-criteria)
|
|
16
|
+
12. [Critical Reminders](#critical-reminders)
|
|
17
|
+
|
|
18
|
+
## Overview
|
|
19
|
+
|
|
20
|
+
Comprehensive reference for red teaming tools across cybersecurity and AI/LLM domains. Organized by function and use case.
|
|
21
|
+
|
|
22
|
+
## MITRE ATT&CK Ecosystem
|
|
23
|
+
|
|
24
|
+
### ATT&CK Navigator
|
|
25
|
+
- **Purpose**: Visual red team planning and heat mapping
|
|
26
|
+
- **URL**: https://mitre-attack.github.io/attack-navigator/
|
|
27
|
+
- **Features**:
|
|
28
|
+
- Layer-based technique mapping
|
|
29
|
+
- APT group TTP visualization
|
|
30
|
+
- Detection coverage heat maps
|
|
31
|
+
- Export to JSON, SVG, Excel
|
|
32
|
+
- **Use Case**: Plan red team operations, visualize detection gaps
|
|
33
|
+
|
|
34
|
+
### Atomic Red Team
|
|
35
|
+
- **Purpose**: Pre-built ATT&CK technique tests
|
|
36
|
+
- **Developer**: Red Canary (open source)
|
|
37
|
+
- **GitHub**: https://github.com/redcanaryco/atomic-red-team
|
|
38
|
+
- **Features**:
|
|
39
|
+
- 200+ technique tests
|
|
40
|
+
- Cross-platform (Windows, Linux, macOS)
|
|
41
|
+
- ~5 minutes per test
|
|
42
|
+
- Invoke-Atomic PowerShell framework
|
|
43
|
+
- **Use Case**: Quick technique validation, purple teaming
|
|
44
|
+
|
|
45
|
+
### CALDERA
|
|
46
|
+
- **Purpose**: Automated adversary emulation
|
|
47
|
+
- **Developer**: MITRE (open source)
|
|
48
|
+
- **GitHub**: https://github.com/mitre/caldera
|
|
49
|
+
- **Features**:
|
|
50
|
+
- Autonomous red team operations
|
|
51
|
+
- Plugin architecture (OT protocols, Atomic Red Team integration)
|
|
52
|
+
- AI planning engine
|
|
53
|
+
- Web-based management
|
|
54
|
+
- **Use Case**: Automated red team campaigns, continuous testing
|
|
55
|
+
|
|
56
|
+
### ATT&CK Evaluations
|
|
57
|
+
- **Purpose**: Independent product testing
|
|
58
|
+
- **URL**: https://attackevals.mitre-engenuity.org/
|
|
59
|
+
- **Features**:
|
|
60
|
+
- Standardized adversary emulation
|
|
61
|
+
- EDR/XDR evaluation
|
|
62
|
+
- Public methodology and results
|
|
63
|
+
- **Use Case**: Evaluate security product effectiveness
|
|
64
|
+
|
|
65
|
+
## Command & Control (C2) Frameworks
|
|
66
|
+
|
|
67
|
+
### Cobalt Strike
|
|
68
|
+
- **Type**: Commercial ($3,500/user/year)
|
|
69
|
+
- **Strengths**:
|
|
70
|
+
- Industry standard for red teams and APTs
|
|
71
|
+
- Malleable C2 profiles (traffic shaping)
|
|
72
|
+
- Beacon implant with many post-exploitation features
|
|
73
|
+
- Sleep obfuscation, AMSI bypass
|
|
74
|
+
- **Weaknesses**:
|
|
75
|
+
- Well-signatured by defenders
|
|
76
|
+
- Expensive
|
|
77
|
+
- Frequently cracked versions used by criminals (bad optics)
|
|
78
|
+
- **Use Case**: Professional red team engagements
|
|
79
|
+
|
|
80
|
+
### Sliver
|
|
81
|
+
- **Type**: Open source (GPL-3.0)
|
|
82
|
+
- **Developer**: BishopFox
|
|
83
|
+
- **GitHub**: https://github.com/BishopFox/sliver
|
|
84
|
+
- **Strengths**:
|
|
85
|
+
- Modern architecture (Go-based)
|
|
86
|
+
- Strong encryption (mTLS, WireGuard, HTTP(S))
|
|
87
|
+
- Cross-platform implants
|
|
88
|
+
- Multi-player support
|
|
89
|
+
- Active development
|
|
90
|
+
- **Weaknesses**:
|
|
91
|
+
- Less mature than Cobalt Strike
|
|
92
|
+
- Smaller community
|
|
93
|
+
- **Use Case**: Budget-conscious red teams, modern C2 requirements
|
|
94
|
+
|
|
95
|
+
### Empire/Starkiller
|
|
96
|
+
- **Type**: Open source
|
|
97
|
+
- **GitHub**: https://github.com/BC-SECURITY/Empire
|
|
98
|
+
- **Strengths**:
|
|
99
|
+
- PowerShell and Python agents
|
|
100
|
+
- Modular post-exploitation
|
|
101
|
+
- Starkiller GUI (user-friendly)
|
|
102
|
+
- **Weaknesses**:
|
|
103
|
+
- PowerShell heavily monitored
|
|
104
|
+
- Less stealthy than alternatives
|
|
105
|
+
- **Use Case**: Windows-heavy environments, PowerShell red teams
|
|
106
|
+
|
|
107
|
+
### Mythic
|
|
108
|
+
- **Type**: Open source
|
|
109
|
+
- **GitHub**: https://github.com/its-a-feature/Mythic
|
|
110
|
+
- **Strengths**:
|
|
111
|
+
- Web-based collaborative UI
|
|
112
|
+
- Plugin architecture for agents
|
|
113
|
+
- Logging and reporting built-in
|
|
114
|
+
- Docker-based deployment
|
|
115
|
+
- **Weaknesses**:
|
|
116
|
+
- Requires setup effort
|
|
117
|
+
- Less documentation than Cobalt Strike
|
|
118
|
+
- **Use Case**: Team-based red team operations, custom agent development
|
|
119
|
+
|
|
120
|
+
## Exploitation Frameworks
|
|
121
|
+
|
|
122
|
+
### Metasploit
|
|
123
|
+
- **Type**: Open source (Rapid7)
|
|
124
|
+
- **Website**: https://www.metasploit.com/
|
|
125
|
+
- **Strengths**:
|
|
126
|
+
- 2,300+ exploits
|
|
127
|
+
- Meterpreter post-exploitation framework
|
|
128
|
+
- Database for session management
|
|
129
|
+
- Extensive community modules
|
|
130
|
+
- **Weaknesses**:
|
|
131
|
+
- Well-signatured by AV/EDR
|
|
132
|
+
- Noisy by default
|
|
133
|
+
- **Use Case**: Exploitation, post-exploitation, penetration testing
|
|
134
|
+
|
|
135
|
+
### Covenant
|
|
136
|
+
- **Type**: Open source
|
|
137
|
+
- **GitHub**: https://github.com/cobbr/Covenant
|
|
138
|
+
- **Strengths**:
|
|
139
|
+
- .NET-based C2
|
|
140
|
+
- Web-based UI
|
|
141
|
+
- Grunts (implants) with .NET in-memory execution
|
|
142
|
+
- **Weaknesses**:
|
|
143
|
+
- Development slowed
|
|
144
|
+
- Smaller community
|
|
145
|
+
- **Use Case**: .NET-focused red teams, post-exploitation
|
|
146
|
+
|
|
147
|
+
### Merlin
|
|
148
|
+
- **Type**: Open source
|
|
149
|
+
- **GitHub**: https://github.com/Ne0nd0g/merlin
|
|
150
|
+
- **Strengths**:
|
|
151
|
+
- Go-based agents (cross-platform)
|
|
152
|
+
- HTTP/2 C2 (stealthy)
|
|
153
|
+
- QUIC support
|
|
154
|
+
- **Weaknesses**:
|
|
155
|
+
- Command-line interface only
|
|
156
|
+
- Less feature-rich than Cobalt Strike
|
|
157
|
+
- **Use Case**: Stealthy C2, cross-platform red teams
|
|
158
|
+
|
|
159
|
+
## Credential Attacks
|
|
160
|
+
|
|
161
|
+
### Mimikatz
|
|
162
|
+
- **Type**: Open source
|
|
163
|
+
- **Developer**: Benjamin Delpy
|
|
164
|
+
- **GitHub**: https://github.com/gentilkiwi/mimikatz
|
|
165
|
+
- **Strengths**:
|
|
166
|
+
- Extract plaintext passwords, hashes, Kerberos tickets
|
|
167
|
+
- Pass-the-hash, pass-the-ticket
|
|
168
|
+
- Golden/Silver ticket creation
|
|
169
|
+
- **Weaknesses**:
|
|
170
|
+
- Heavily signatured by AV/EDR
|
|
171
|
+
- Requires admin privileges
|
|
172
|
+
- **Use Case**: Credential dumping, Kerberos attacks
|
|
173
|
+
|
|
174
|
+
### BloodHound
|
|
175
|
+
- **Type**: Open source
|
|
176
|
+
- **GitHub**: https://github.com/BloodHoundAD/BloodHound
|
|
177
|
+
- **Strengths**:
|
|
178
|
+
- Active Directory attack path visualization
|
|
179
|
+
- Graph-based analysis
|
|
180
|
+
- Identifies shortest path to Domain Admin
|
|
181
|
+
- **Weaknesses**:
|
|
182
|
+
- Requires SharpHound data collection (can be detected)
|
|
183
|
+
- Learning curve for graph query language
|
|
184
|
+
- **Use Case**: Active Directory enumeration and attack planning
|
|
185
|
+
|
|
186
|
+
### Rubeus
|
|
187
|
+
- **Type**: Open source
|
|
188
|
+
- **GitHub**: https://github.com/GhostPack/Rubeus
|
|
189
|
+
- **Strengths**:
|
|
190
|
+
- Kerberos abuse toolkit
|
|
191
|
+
- Kerberoasting, AS-REP roasting
|
|
192
|
+
- Ticket manipulation
|
|
193
|
+
- **Weaknesses**:
|
|
194
|
+
- .NET executable (may be blocked by AppLocker)
|
|
195
|
+
- **Use Case**: Kerberos-based attacks in Active Directory
|
|
196
|
+
|
|
197
|
+
### Impacket
|
|
198
|
+
- **Type**: Open source (Python library)
|
|
199
|
+
- **GitHub**: https://github.com/fortra/impacket
|
|
200
|
+
- **Strengths**:
|
|
201
|
+
- Python implementation of network protocols
|
|
202
|
+
- SMB, MSRPC, LDAP, Kerberos
|
|
203
|
+
- Standalone scripts (psexec.py, secretsdump.py, etc.)
|
|
204
|
+
- **Weaknesses**:
|
|
205
|
+
- Python dependency (not always available on target)
|
|
206
|
+
- **Use Case**: Network protocol exploitation, lateral movement
|
|
207
|
+
|
|
208
|
+
## Phishing & Social Engineering
|
|
209
|
+
|
|
210
|
+
### Gophish
|
|
211
|
+
- **Type**: Open source
|
|
212
|
+
- **Website**: https://getgophish.com/
|
|
213
|
+
- **Strengths**:
|
|
214
|
+
- Full-featured phishing framework
|
|
215
|
+
- Email templates and landing pages
|
|
216
|
+
- Campaign tracking and reporting
|
|
217
|
+
- User-friendly web UI
|
|
218
|
+
- **Weaknesses**:
|
|
219
|
+
- Server infrastructure required
|
|
220
|
+
- Email deliverability challenges
|
|
221
|
+
- **Use Case**: Phishing campaigns, security awareness training
|
|
222
|
+
|
|
223
|
+
### Social-Engineer Toolkit (SET)
|
|
224
|
+
- **Type**: Open source (TrustedSec)
|
|
225
|
+
- **GitHub**: https://github.com/trustedsec/social-engineer-toolkit
|
|
226
|
+
- **Strengths**:
|
|
227
|
+
- Automated phishing and credential harvesting
|
|
228
|
+
- Mass mailer
|
|
229
|
+
- QR code attacks
|
|
230
|
+
- Wireless access point attacks
|
|
231
|
+
- **Weaknesses**:
|
|
232
|
+
- Text-based menu interface
|
|
233
|
+
- Requires setup
|
|
234
|
+
- **Use Case**: Multi-vector social engineering campaigns
|
|
235
|
+
|
|
236
|
+
### EvilNginx
|
|
237
|
+
- **Type**: Open source
|
|
238
|
+
- **GitHub**: https://github.com/kgretzky/evilginx2
|
|
239
|
+
- **Strengths**:
|
|
240
|
+
- Adversary-in-the-middle (AitM) phishing
|
|
241
|
+
- Bypass 2FA (session hijacking)
|
|
242
|
+
- Reverse proxy architecture
|
|
243
|
+
- **Weaknesses**:
|
|
244
|
+
- Complex setup
|
|
245
|
+
- Requires custom phishlets
|
|
246
|
+
- **Use Case**: Advanced phishing bypassing MFA
|
|
247
|
+
|
|
248
|
+
## OSINT & Reconnaissance
|
|
249
|
+
|
|
250
|
+
### theHarvester
|
|
251
|
+
- **Type**: Open source
|
|
252
|
+
- **GitHub**: https://github.com/laramies/theHarvester
|
|
253
|
+
- **Strengths**:
|
|
254
|
+
- Email, subdomain, name enumeration
|
|
255
|
+
- Multiple search engines (Google, Bing, Shodan, etc.)
|
|
256
|
+
- Fast reconnaissance
|
|
257
|
+
- **Weaknesses**:
|
|
258
|
+
- API rate limits
|
|
259
|
+
- **Use Case**: Initial OSINT, target profiling
|
|
260
|
+
|
|
261
|
+
### Shodan
|
|
262
|
+
- **Type**: Commercial (free tier available)
|
|
263
|
+
- **Website**: https://www.shodan.io/
|
|
264
|
+
- **Strengths**:
|
|
265
|
+
- Internet-connected device search engine
|
|
266
|
+
- Identify exposed services and vulnerabilities
|
|
267
|
+
- API access
|
|
268
|
+
- **Weaknesses**:
|
|
269
|
+
- Paid features for advanced queries
|
|
270
|
+
- **Use Case**: External asset discovery, vulnerability research
|
|
271
|
+
|
|
272
|
+
### Amass
|
|
273
|
+
- **Type**: Open source (OWASP)
|
|
274
|
+
- **GitHub**: https://github.com/owasp-amass/amass
|
|
275
|
+
- **Strengths**:
|
|
276
|
+
- DNS enumeration and network mapping
|
|
277
|
+
- Subdomain discovery
|
|
278
|
+
- ASN mapping
|
|
279
|
+
- **Weaknesses**:
|
|
280
|
+
- Slow for large domains
|
|
281
|
+
- **Use Case**: External attack surface mapping
|
|
282
|
+
|
|
283
|
+
### SpiderFoot
|
|
284
|
+
- **Type**: Open source
|
|
285
|
+
- **Website**: https://www.spiderfoot.net/
|
|
286
|
+
- **Strengths**:
|
|
287
|
+
- Automated OSINT collection
|
|
288
|
+
- 200+ data sources
|
|
289
|
+
- Web UI and correlation engine
|
|
290
|
+
- **Weaknesses**:
|
|
291
|
+
- Resource-intensive
|
|
292
|
+
- **Use Case**: Comprehensive OSINT investigations
|
|
293
|
+
|
|
294
|
+
## AI/LLM Red Teaming Tools
|
|
295
|
+
|
|
296
|
+
### DeepTeam
|
|
297
|
+
- **Type**: Open source (Python framework)
|
|
298
|
+
- **GitHub**: https://github.com/confident-ai/deepteam
|
|
299
|
+
- **Strengths**:
|
|
300
|
+
- 40+ vulnerabilities (OWASP Top 10 LLM aligned)
|
|
301
|
+
- 10+ attack methods (single-turn & multi-turn)
|
|
302
|
+
- LLM-as-judge evaluation
|
|
303
|
+
- YAML-based configuration
|
|
304
|
+
- CLI and programmatic API
|
|
305
|
+
- **Weaknesses**:
|
|
306
|
+
- Requires API keys for evaluation models
|
|
307
|
+
- Python dependency
|
|
308
|
+
- **Use Case**: Comprehensive LLM security testing, CI/CD integration
|
|
309
|
+
|
|
310
|
+
### Promptfoo
|
|
311
|
+
- **Type**: Open source
|
|
312
|
+
- **Website**: https://www.promptfoo.dev/
|
|
313
|
+
- **GitHub**: https://github.com/promptfoo/promptfoo
|
|
314
|
+
- **Strengths**:
|
|
315
|
+
- 20+ red team vulnerability categories
|
|
316
|
+
- Custom evaluation metrics
|
|
317
|
+
- Supports multiple LLM providers
|
|
318
|
+
- Web UI for results visualization
|
|
319
|
+
- **Weaknesses**:
|
|
320
|
+
- Node.js dependency
|
|
321
|
+
- **Use Case**: LLM application testing, prompt optimization
|
|
322
|
+
|
|
323
|
+
### FLIRT (Feedback Loop In-context Red Teaming)
|
|
324
|
+
- **Type**: Research tool
|
|
325
|
+
- **Paper**: https://arxiv.org/abs/2308.04265
|
|
326
|
+
- **Strengths**:
|
|
327
|
+
- Iterative attack refinement
|
|
328
|
+
- Uses feedback to improve attacks
|
|
329
|
+
- High success rate
|
|
330
|
+
- **Weaknesses**:
|
|
331
|
+
- Research prototype (not production-ready)
|
|
332
|
+
- **Use Case**: Academic research, advanced red teaming
|
|
333
|
+
|
|
334
|
+
### AdvPrompter
|
|
335
|
+
- **Type**: Research tool
|
|
336
|
+
- **Strengths**:
|
|
337
|
+
- LLM-based adversarial prompt generation
|
|
338
|
+
- Optimizes for effectiveness and speed
|
|
339
|
+
- Generates human-readable attacks
|
|
340
|
+
- **Weaknesses**:
|
|
341
|
+
- Research prototype
|
|
342
|
+
- **Use Case**: Automated attack generation research
|
|
343
|
+
|
|
344
|
+
### GRT (Gandalf Red Team)
|
|
345
|
+
- **Type**: Community challenge platform
|
|
346
|
+
- **Website**: https://gandalf.lakera.ai/
|
|
347
|
+
- **Strengths**:
|
|
348
|
+
- Gamified LLM red teaming
|
|
349
|
+
- Levels of difficulty
|
|
350
|
+
- Community leaderboard
|
|
351
|
+
- **Weaknesses**:
|
|
352
|
+
- Limited to specific scenarios
|
|
353
|
+
- **Use Case**: LLM security training, skill building
|
|
354
|
+
|
|
355
|
+
### JailbreakBench
|
|
356
|
+
- **Type**: Open benchmark
|
|
357
|
+
- **Website**: https://jailbreakbench.github.io/
|
|
358
|
+
- **Strengths**:
|
|
359
|
+
- Standardized jailbreak evaluation
|
|
360
|
+
- Public leaderboard
|
|
361
|
+
- Reproducible testing
|
|
362
|
+
- **Weaknesses**:
|
|
363
|
+
- Limited to jailbreak testing
|
|
364
|
+
- **Use Case**: LLM robustness benchmarking
|
|
365
|
+
|
|
366
|
+
## Network Security Tools
|
|
367
|
+
|
|
368
|
+
### Nmap
|
|
369
|
+
- **Type**: Open source
|
|
370
|
+
- **Website**: https://nmap.org/
|
|
371
|
+
- **Strengths**:
|
|
372
|
+
- Port scanning and service detection
|
|
373
|
+
- OS fingerprinting
|
|
374
|
+
- NSE (Nmap Scripting Engine) for automation
|
|
375
|
+
- **Use Case**: Network reconnaissance, vulnerability scanning
|
|
376
|
+
|
|
377
|
+
### Burp Suite
|
|
378
|
+
- **Type**: Commercial (free Community edition)
|
|
379
|
+
- **Website**: https://portswigger.net/burp
|
|
380
|
+
- **Strengths**:
|
|
381
|
+
- Web application security testing
|
|
382
|
+
- Proxy, scanner, intruder, repeater
|
|
383
|
+
- Extensible with BApps
|
|
384
|
+
- **Use Case**: Web application penetration testing
|
|
385
|
+
|
|
386
|
+
### Wireshark
|
|
387
|
+
- **Type**: Open source
|
|
388
|
+
- **Website**: https://www.wireshark.org/
|
|
389
|
+
- **Strengths**:
|
|
390
|
+
- Network protocol analyzer
|
|
391
|
+
- Packet capture and dissection
|
|
392
|
+
- Display filters and analysis
|
|
393
|
+
- **Use Case**: Network traffic analysis, protocol debugging
|
|
394
|
+
|
|
395
|
+
## Defensive Tools (Blue Team)
|
|
396
|
+
|
|
397
|
+
### Velociraptor
|
|
398
|
+
- **Type**: Open source
|
|
399
|
+
- **Website**: https://www.rapid7.com/products/velociraptor/
|
|
400
|
+
- **Strengths**:
|
|
401
|
+
- Endpoint visibility and forensics
|
|
402
|
+
- Hunt malicious activity
|
|
403
|
+
- Incident response platform
|
|
404
|
+
- **Use Case**: Detection engineering, threat hunting
|
|
405
|
+
|
|
406
|
+
### Sigma
|
|
407
|
+
- **Type**: Open source (detection rule format)
|
|
408
|
+
- **GitHub**: https://github.com/SigmaHQ/sigma
|
|
409
|
+
- **Strengths**:
|
|
410
|
+
- Generic signature format for SIEM
|
|
411
|
+
- 3,000+ detection rules
|
|
412
|
+
- Convert to Splunk, Elastic, QRadar
|
|
413
|
+
- **Use Case**: Detection rule development and sharing
|
|
414
|
+
|
|
415
|
+
### YARA
|
|
416
|
+
- **Type**: Open source
|
|
417
|
+
- **Website**: https://virustotal.github.io/yara/
|
|
418
|
+
- **Strengths**:
|
|
419
|
+
- Malware identification and classification
|
|
420
|
+
- Pattern matching for files and processes
|
|
421
|
+
- Widely adopted
|
|
422
|
+
- **Use Case**: Malware detection, threat intelligence
|
|
423
|
+
|
|
424
|
+
## Tool Selection Criteria
|
|
425
|
+
|
|
426
|
+
### For Cybersecurity Red Teaming
|
|
427
|
+
- **Initial Access**: Metasploit, Cobalt Strike, custom exploits
|
|
428
|
+
- **C2 Infrastructure**: Sliver (budget), Cobalt Strike (professional), Mythic (team)
|
|
429
|
+
- **Credential Attacks**: Mimikatz, BloodHound, Rubeus, Impacket
|
|
430
|
+
- **Phishing**: Gophish (standard), EvilNginx (advanced MFA bypass)
|
|
431
|
+
- **OSINT**: theHarvester (quick), Amass (comprehensive), Shodan (external)
|
|
432
|
+
|
|
433
|
+
### For AI/LLM Red Teaming
|
|
434
|
+
- **Comprehensive Testing**: DeepTeam (production), Promptfoo (development)
|
|
435
|
+
- **Research**: FLIRT, AdvPrompter, academic frameworks
|
|
436
|
+
- **Benchmarking**: JailbreakBench, public leaderboards
|
|
437
|
+
- **Training**: GRT (Gandalf), capture-the-flag platforms
|
|
438
|
+
|
|
439
|
+
## Critical Reminders
|
|
440
|
+
|
|
441
|
+
- **Licensing**: Verify tool licenses (commercial vs. open source)
|
|
442
|
+
- **Legal Use**: Only use tools for authorized red team operations
|
|
443
|
+
- **Detection**: Most tools are well-signatured; customize for stealth
|
|
444
|
+
- **Updates**: Tools evolve rapidly; stay current with latest versions
|
|
445
|
+
- **Operational Security**: Protect red team infrastructure and tool chains
|
|
446
|
+
- **Blue Team Value**: Share tool knowledge with defenders for detection engineering
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
fast
|
|
@@ -0,0 +1,225 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: releasing
|
|
3
|
+
description: >
|
|
4
|
+
Automate the full release workflow: version bumping (major/minor/patch), changelog generation,
|
|
5
|
+
git tagging, pushing, and GitHub release creation. Handles semver across Node.js, Python, Rust,
|
|
6
|
+
Go, and generic projects. Enforces mandatory confirmations before irreversible actions (push, release).
|
|
7
|
+
USE WHEN: user says "release", "bump version", "cut a release", "tag and release", "/releasing",
|
|
8
|
+
or asks to prepare a new version of their project.
|
|
9
|
+
category: deployment
|
|
10
|
+
---
|
|
11
|
+
|
|
12
|
+
# Releasing
|
|
13
|
+
|
|
14
|
+
Automate version bumps, changelog, git tags, and GitHub releases. Stop gates enforce confirmation before every irreversible action.
|
|
15
|
+
|
|
16
|
+
## Workflow
|
|
17
|
+
|
|
18
|
+
1. Detect ecosystem and current version
|
|
19
|
+
2. Confirm bump type with user
|
|
20
|
+
3. Execute release pipeline
|
|
21
|
+
|
|
22
|
+
## Step 1: Pre-flight Checks
|
|
23
|
+
|
|
24
|
+
Run all checks. Stop and report on any failure.
|
|
25
|
+
|
|
26
|
+
```bash
|
|
27
|
+
# Must be in a git repo
|
|
28
|
+
git rev-parse --is-inside-work-tree
|
|
29
|
+
|
|
30
|
+
# Must have clean working tree (no uncommitted changes)
|
|
31
|
+
git status --porcelain
|
|
32
|
+
|
|
33
|
+
# Must be on a releasable branch (main, master, or release/*)
|
|
34
|
+
git branch --show-current
|
|
35
|
+
|
|
36
|
+
# Must have a remote configured
|
|
37
|
+
git remote -v
|
|
38
|
+
|
|
39
|
+
# Check if gh CLI is available (needed for GitHub release)
|
|
40
|
+
command -v gh
|
|
41
|
+
```
|
|
42
|
+
|
|
43
|
+
**Dirty tree:** Stop. User must commit or stash first.
|
|
44
|
+
**Wrong branch:** Stop. Report branch, ask to continue.
|
|
45
|
+
**No gh CLI:** Warn, skip GitHub release step.
|
|
46
|
+
|
|
47
|
+
## Step 2: Detect Version
|
|
48
|
+
|
|
49
|
+
Scan version files in priority order:
|
|
50
|
+
|
|
51
|
+
| Priority | File | Ecosystem | Pattern |
|
|
52
|
+
|----------|------|-----------|---------|
|
|
53
|
+
| 1 | `package.json` | Node.js | `"version": "X.Y.Z"` |
|
|
54
|
+
| 2 | `pyproject.toml` | Python | `version = "X.Y.Z"` |
|
|
55
|
+
| 3 | `Cargo.toml` | Rust | `version = "X.Y.Z"` |
|
|
56
|
+
| 4 | `setup.cfg` | Python (legacy) | `version = X.Y.Z` |
|
|
57
|
+
| 5 | `VERSION` | Generic | Plain text `X.Y.Z` |
|
|
58
|
+
| 6 | Latest git tag | Any | `vX.Y.Z` or `X.Y.Z` |
|
|
59
|
+
|
|
60
|
+
For full detection patterns and edge cases, load `references/version-detection.md`.
|
|
61
|
+
|
|
62
|
+
**Report to user:** "Current version: **X.Y.Z** (detected from `<file>`)"
|
|
63
|
+
|
|
64
|
+
## Step 3: Determine Bump Type
|
|
65
|
+
|
|
66
|
+
Use user-specified type if provided. Otherwise:
|
|
67
|
+
|
|
68
|
+
**Stop Condition (Mandatory):** Ask user to choose bump type.
|
|
69
|
+
- **patch** (X.Y.Z -> X.Y.Z+1) - Bug fixes, small changes
|
|
70
|
+
- **minor** (X.Y.Z -> X.Y+1.0) - New features, backward compatible
|
|
71
|
+
- **major** (X.Y.Z -> X+1.0.0) - Breaking changes
|
|
72
|
+
|
|
73
|
+
Calculate and show the new version before proceeding.
|
|
74
|
+
|
|
75
|
+
## Step 4: Update Version File
|
|
76
|
+
|
|
77
|
+
Apply the version bump to the detected file:
|
|
78
|
+
|
|
79
|
+
```bash
|
|
80
|
+
# Node.js - use npm version without git tag (we handle tagging ourselves)
|
|
81
|
+
npm version <patch|minor|major> --no-git-tag-version
|
|
82
|
+
|
|
83
|
+
# Python (pyproject.toml) - sed replacement
|
|
84
|
+
# Rust (Cargo.toml) - sed replacement
|
|
85
|
+
# Generic - direct file write
|
|
86
|
+
```
|
|
87
|
+
|
|
88
|
+
**Important:** Only update the version file. Do NOT run `npm version` with default behavior (it creates its own tag).
|
|
89
|
+
|
|
90
|
+
Also update `package-lock.json` if it exists (Node.js):
|
|
91
|
+
```bash
|
|
92
|
+
[ -f package-lock.json ] && npm install --package-lock-only
|
|
93
|
+
```
|
|
94
|
+
|
|
95
|
+
## Step 5: Update Changelog
|
|
96
|
+
|
|
97
|
+
Check if `CHANGELOG.md` exists. If not, create it.
|
|
98
|
+
|
|
99
|
+
Generate changelog entries from git log since last tag:
|
|
100
|
+
|
|
101
|
+
```bash
|
|
102
|
+
# Get last tag
|
|
103
|
+
LAST_TAG=$(git describe --tags --abbrev=0 2>/dev/null || echo "")
|
|
104
|
+
|
|
105
|
+
# Get commits since last tag (or all commits if no tag)
|
|
106
|
+
if [ -n "$LAST_TAG" ]; then
|
|
107
|
+
git log "$LAST_TAG"..HEAD --pretty=format:"- %s (%h)" --no-merges
|
|
108
|
+
else
|
|
109
|
+
git log --pretty=format:"- %s (%h)" --no-merges
|
|
110
|
+
fi
|
|
111
|
+
```
|
|
112
|
+
|
|
113
|
+
Prepend new section to CHANGELOG.md in this format:
|
|
114
|
+
|
|
115
|
+
```markdown
|
|
116
|
+
## [X.Y.Z] - YYYY-MM-DD
|
|
117
|
+
|
|
118
|
+
### Changes
|
|
119
|
+
- commit message 1 (abc1234)
|
|
120
|
+
- commit message 2 (def5678)
|
|
121
|
+
```
|
|
122
|
+
|
|
123
|
+
**Categorize commits if conventional commits are used:**
|
|
124
|
+
- `feat:` -> "Added"
|
|
125
|
+
- `fix:` -> "Fixed"
|
|
126
|
+
- `docs:` -> "Documentation"
|
|
127
|
+
- `refactor:` -> "Changed"
|
|
128
|
+
- `BREAKING CHANGE:` -> "Breaking Changes" (at top)
|
|
129
|
+
- Other -> "Changes"
|
|
130
|
+
|
|
131
|
+
## Step 6: Commit Version Bump
|
|
132
|
+
|
|
133
|
+
```bash
|
|
134
|
+
git add -A
|
|
135
|
+
git commit -m "chore(release): v<NEW_VERSION>"
|
|
136
|
+
```
|
|
137
|
+
|
|
138
|
+
Show the commit to user for awareness.
|
|
139
|
+
|
|
140
|
+
## Step 7: Create Git Tag
|
|
141
|
+
|
|
142
|
+
```bash
|
|
143
|
+
git tag -a "v<NEW_VERSION>" -m "Release v<NEW_VERSION>"
|
|
144
|
+
```
|
|
145
|
+
|
|
146
|
+
## Step 8: Push (with confirmation)
|
|
147
|
+
|
|
148
|
+
**Stop Condition (Mandatory):** This is irreversible. Ask user before pushing.
|
|
149
|
+
|
|
150
|
+
Show exactly what will be pushed:
|
|
151
|
+
- Branch: `<branch_name>`
|
|
152
|
+
- Remote: `<remote_name>` (`<remote_url>`)
|
|
153
|
+
- Commits: list new commits
|
|
154
|
+
- Tag: `v<NEW_VERSION>`
|
|
155
|
+
|
|
156
|
+
Only after user confirms:
|
|
157
|
+
|
|
158
|
+
```bash
|
|
159
|
+
git push origin <branch_name>
|
|
160
|
+
git push origin "v<NEW_VERSION>"
|
|
161
|
+
```
|
|
162
|
+
|
|
163
|
+
## Step 9: Create GitHub Release (with confirmation)
|
|
164
|
+
|
|
165
|
+
Skip if `gh` CLI is not available.
|
|
166
|
+
|
|
167
|
+
**Stop Condition (Mandatory):** Ask user before creating public release.
|
|
168
|
+
|
|
169
|
+
```bash
|
|
170
|
+
# Extract changelog for this version to use as release notes
|
|
171
|
+
gh release create "v<NEW_VERSION>" \
|
|
172
|
+
--title "v<NEW_VERSION>" \
|
|
173
|
+
--notes "<changelog_for_this_version>" \
|
|
174
|
+
--latest
|
|
175
|
+
```
|
|
176
|
+
|
|
177
|
+
For pre-release versions (contains `-alpha`, `-beta`, `-rc`):
|
|
178
|
+
```bash
|
|
179
|
+
gh release create "v<NEW_VERSION>" \
|
|
180
|
+
--title "v<NEW_VERSION>" \
|
|
181
|
+
--notes "<changelog>" \
|
|
182
|
+
--prerelease
|
|
183
|
+
```
|
|
184
|
+
|
|
185
|
+
## Step 10: Post-release Verification
|
|
186
|
+
|
|
187
|
+
Verify everything succeeded:
|
|
188
|
+
|
|
189
|
+
```bash
|
|
190
|
+
# Verify tag exists on remote
|
|
191
|
+
git ls-remote --tags origin "v<NEW_VERSION>"
|
|
192
|
+
|
|
193
|
+
# Verify GitHub release (if created)
|
|
194
|
+
gh release view "v<NEW_VERSION>" --json tagName,isDraft,isPrerelease
|
|
195
|
+
```
|
|
196
|
+
|
|
197
|
+
Report final summary:
|
|
198
|
+
```
|
|
199
|
+
Release v<NEW_VERSION> complete:
|
|
200
|
+
Version file: <file> updated
|
|
201
|
+
Changelog: CHANGELOG.md updated
|
|
202
|
+
Tag: v<NEW_VERSION> created and pushed
|
|
203
|
+
GitHub Release: published (or: skipped)
|
|
204
|
+
```
|
|
205
|
+
|
|
206
|
+
## Quick Reference: Common Invocations
|
|
207
|
+
|
|
208
|
+
| User says | Bump type | Notes |
|
|
209
|
+
|-----------|-----------|-------|
|
|
210
|
+
| "release patch" | patch | Fastest path |
|
|
211
|
+
| "bump minor" | minor | New feature release |
|
|
212
|
+
| "major release" | major | Breaking change |
|
|
213
|
+
| "release" / "cut a release" | ask user | Must confirm type |
|
|
214
|
+
| "release 2.0.0" | explicit | Use exact version given |
|
|
215
|
+
| "prerelease" / "release beta" | prepatch with `-beta.1` | Mark as prerelease |
|
|
216
|
+
|
|
217
|
+
## Error Recovery
|
|
218
|
+
|
|
219
|
+
| Error | Recovery |
|
|
220
|
+
|-------|----------|
|
|
221
|
+
| Push rejected (behind remote) | `git pull --rebase` then retry push |
|
|
222
|
+
| Tag already exists | Ask user: force-update tag or use different version? |
|
|
223
|
+
| gh auth failed | Run `gh auth login` and retry |
|
|
224
|
+
| Version file not found | Ask user which file contains the version |
|
|
225
|
+
| Merge conflict in changelog | Open file for manual resolution, then continue |
|