From communitytools
Gathers OSINT from company GitHub/GitLab repos: enumerates orgs/employees, scans secrets via gitleaks/trufflehog in code/git history, maps tech stacks/exposures. For security recon.
npx claudepluginhub transilienceai/communitytoolsThis skill uses the workspace's default tool permissions.
Passive and semi-passive intelligence gathering focused on code repositories, developer footprints, and exposed secrets across public platforms.
Maps organization's external attack surface via OSINT reconnaissance from public sources: DNS records, cert transparency logs, search engines, social media, repos, breach DBs. For pentest footprinting.
Conducts passive OSINT reconnaissance to map external attack surfaces from DNS records, cert transparency logs, search engines, social media, repos, and breach databases. For pentesting footprinting.
Hunts API keys, tokens, and credentials in JS bundles, GitHub repos, Postman collections, and API specs using TruffleHog, Gitleaks during pentest phase 2 from recon data.
Share bugs, ideas, or general feedback.
Passive and semi-passive intelligence gathering focused on code repositories, developer footprints, and exposed secrets across public platforms.
.env, config files, secrets in current codegitleaks / trufflehogreference/repository-recon.md)data/reconnaissance/repositories.json # Repo inventory + findings
reports/reconnaissance_report.md # OSINT section appended
raw/osint/ # Raw tool outputs
trufflehog, gitleaks, gitrob, GitHub/GitLab search, gh CLI, git log
{OUTPUT_DIR}/ per CLAUDE.md directory structurereference/repository-recon.md - Dorks, tool commands, secret patterns, workflow