From awesome-web-security
Looks up web security learning resources from a curated index: XSS, SQLi, CSRF, SSRF, OAuth/JWT, deserialization, SAML, recon, evasion, defensive tooling, CTF. Filters by topic, difficulty, language, and type.
npx claudepluginhub qazbnm456/awesome-web-security --plugin awesome-web-securityThis skill uses the workspace's default tool permissions.
Curated lookup over [qazbnm456/awesome-web-security](https://github.com/qazbnm456/awesome-web-security).
Looks up web security learning resources from a curated index: XSS, SQLi, CSRF, SSRF, OAuth/JWT, deserialization, SAML, recon, evasion, defensive tooling, CTF. Filters by topic, difficulty, language, and type.
Fetches and extracts security testing payloads from PayloadsAllTheThings on demand. Supports SQLi, XSS, SSTI, SSRF, command injection, privilege escalation, and more.
References 100 critical web vulnerabilities by category with definitions, root causes, impacts, and mitigations. Useful for web security audits, testing, and remediation.
Share bugs, ideas, or general feedback.
Curated lookup over qazbnm456/awesome-web-security.
Always fetches the latest index from raw.githubusercontent.com — no stale snapshot.
A user asks for resources, references, learning paths, or tools related to web security topics: XSS, SQLi, CSRF, SSRF, XXE, OAuth/JWT, prototype pollution, deserialization, SAML, file upload, web cache poisoning, WAF / CSP evasion, browser exploitation, recon (subdomain enumeration, OSINT), DNS rebinding, CTF write-ups, bug bounty methodology, defensive tooling, payload lists, cheatsheets, or related blogs.
https://raw.githubusercontent.com/qazbnm456/awesome-web-security/master/data/index.json{
"schema_version": "1",
"categories": [{"key": "xss", "title": "...", "h_level": 3, "parent": "intro", "anchor": "xss"}],
"entries": [{
"id": "xss-google-app-security",
"url": "...",
"title": "...",
"author": {"name": "...", "url": "..."},
"category": "xss",
"type": "article|tool|cheatsheet|video|book|community|payload-list",
"languages": ["en", "zh", "jp"],
"difficulty": "intro|intermediate|advanced",
"date_added": "YYYY-MM-DD",
"archive_url": "...|null",
"last_checked": "YYYY-MM-DD|null",
"status": "active|dead|archived-only|quarantined"
}]
}
category matching the user's topic (a topic may map to several
categories — for "XSS" check xss, tools-xss, tricks-xss,
practices-xss, evasions-csp as relevant).languages: default to the user's language; fall back to en.difficulty: include all unless the user asked for "intro" or "deep".type: filter by what the user wants — articles, tools, cheatsheets,
payload lists, etc.date_added DESC.difficulty: advanced, then by depth
signals (long titles, payload-list type, presence of author URL).type: tool only.status != active, and a one-line value statement explaining what this
entry teaches.payload-list entries, append: "Test payloads only against systems
you own or have written authorization to test."For each result:
Title — author • difficulty • type One line on what this teaches and why it matters. (Archive fallback: archive_url) — included only when
status != active.
End with:
Cited from qazbnm456/awesome-web-security. Full list and categories at the README.
categories[].parent chain.User: "I'm learning XSS, give me intermediate-level resources in English."
→ Filter category matching xss, tools-xss, tricks-xss, evasions-csp;
languages contains en; difficulty in intermediate or advanced;
rank by date_added DESC; return top 5–7.
User: "我想找最新的 SSRF 文章。"
→ Filter category matching ssrf, tricks-ssrf, tools-ssrf;
languages contains zh; rank by date_added DESC; return in Chinese.
User: "What's a good XSS payload list?"
→ Filter category: xss AND type: payload-list; rank by depth signals.
Append the unauthorized-testing reminder.