From communitytools
Tests network infrastructure for vulnerabilities using port scanning, DNS attacks, MITM, VLAN hopping, IPv6 exploits, SMB/NetBIOS enumeration, sniffing, and DoS assessments. Includes ICS/SCADA and IoT techniques.
npx claudepluginhub transilienceai/communitytoolsThis skill uses the workspace's default tool permissions.
Test network infrastructure for vulnerabilities including network services, protocols, and perimeter security.
reference/dns-quickstart.mdreference/dos-quickstart.mdreference/firewall-detection.mdreference/hardware-embedded-quickstart.mdreference/icmp-scan.mdreference/ics-modbus-quickstart.mdreference/ip-reputation.mdreference/ipv6-quickstart.mdreference/mitm-quickstart.mdreference/os-fingerprint.mdreference/overview.mdreference/port-scanning-quickstart.mdreference/service-enum.mdreference/smb-netbios-quickstart.mdreference/sniffing-quickstart.mdreference/syn-scan.mdreference/udp-scan.mdreference/upnp-iot-quickstart.mdreference/vlan-hopping-quickstart.mdreference/wifi-wpa-enterprise-quickstart.mdGuides nmap-based network reconnaissance: fast full-port SYN scans, service/version detection, NSE scripts, and output parsing. Use for enumerating services and detecting vulnerabilities.
Conducts network penetration tests on authorized targets using Nmap, Metasploit, and PTES methodology for host discovery, port scanning, vulnerability identification, and exploitation assessment.
Conducts authorized network reconnaissance with Nmap: host discovery, port scanning, service enumeration, OS fingerprinting, and NSE vulnerability detection. For security audits and compliance checks.
Share bugs, ideas, or general feedback.
Test network infrastructure for vulnerabilities including network services, protocols, and perimeter security.
| Type | Key Vectors |
|---|---|
| Port Scanning | SYN scan, UDP scan, service detection, OS fingerprinting |
| DNS | Zone transfers, cache poisoning, subdomain takeover, DNS rebinding |
| MITM | ARP spoofing, DNS spoofing, SSL stripping, LLMNR/NBT-NS poisoning |
| VLAN Hopping | Switch spoofing, double tagging |
| IPv6 | RA flooding, neighbor spoofing, tunneling attacks |
| SMB/NetBIOS | Null sessions, relay attacks, enumeration |
| Sniffing | Packet capture, credential harvesting, protocol analysis |
| DoS | Resource exhaustion, amplification, application-layer |
| ICS/SCADA | Modbus TCP, PLC exploitation, coil/register manipulation, session hijacking |
| UPnP / IoT / CPE | rootDesc/SCPD enumeration, vendor SOAP info disclosure (GetPassword), command injection via vendor actions, cross-action auth-key reuse |
| Hardware / Embedded | Logic captures (Saleae .sal), CAN/UART decoding, side-channel password recovery, legacy CPU errata, i386 tools via docker |
Quickstart guides (per attack type):
reference/port-scanning-quickstart.md - Port scanning and service discoveryreference/dns-quickstart.md - DNS attacks and enumerationreference/mitm-quickstart.md - Man-in-the-middle attacksreference/vlan-hopping-quickstart.md - VLAN hopping techniquesreference/ipv6-quickstart.md - IPv6 attack vectorsreference/smb-netbios-quickstart.md - SMB/NetBIOS exploitationreference/sniffing-quickstart.md - Network sniffing and capturereference/dos-quickstart.md - DoS assessmentreference/ics-modbus-quickstart.md - ICS/SCADA Modbus PLC exploitationreference/upnp-iot-quickstart.md - UPnP / IoT / CPE firmware web UI enumeration and exploitationreference/hardware-embedded-quickstart.md - Logic captures, CAN/UART decoding, side-channel char-by-char recovery, legacy CPU bugs (6502), i386 tooling on ARM macOSScan techniques: reference/syn-scan.md, reference/udp-scan.md, reference/icmp-scan.md, reference/os-fingerprint.md
Other: reference/firewall-detection.md, reference/service-enum.md, reference/ip-reputation.md, reference/overview.md