Recon and Methodology Router This is the starting router for new targets and unknown attack surfaces. When to Use You just received a new target and do not yet know what to test first You need to begin with asset discovery, tech fingerprinting, endpoint inventory, and test-route planning You want to build follow-up testing on structured methodology instead of random payload enumeration Skill Map Recon and Methodology Insecure Source Code Management — .git/.svn/.hg exposure detection Dependency Confusion — Supply chain reconnaissance for internal package names Recommended Flow First confirm in-scope assets and target type Then perform asset discovery, port/service identification, technology fingerprinting, and endpoint collection Route based on collected findings to api-sec , auth-sec , injection-checking , or business-logic-vuln
recon-for-sec
安装
npx skills add https://github.com/yaklang/hack-skills --skill recon-for-sec