From communitytools
Fetches payloads from PayloadsAllTheThings for SQL Injection, XSS, Command Injection, SSTI, XXE, SSRF, path traversal, priv esc, and evasion techniques. Useful for live enrichment in security testing prompts.
npx claudepluginhub transilienceai/communitytoolsThis skill uses the workspace's default tool permissions.
Fetches payloads from PayloadsAllTheThings on demand. Use `model="haiku"` when spawning for lightweight operation.
Executes exploitation tests for web/API vulnerabilities like SQLi, XSS, SSRF, JWT confusion, deserialization, prototype pollution during pentest phase 3.
Identifies common web vulnerability patterns like SQL injection, command injection, XSS, and OWASP Top 10 during whitebox pentesting and code reviews.
Provides web vulnerability testing methodology from 88,636 WooYun cases for penetration testing, security audits, code reviews, and research. Covers SQLi, XSS, RCE, file upload, path traversal, unauthorized access.
Share bugs, ideas, or general feedback.
Fetches payloads from PayloadsAllTheThings on demand. Use model="haiku" when spawning for lightweight operation.
payloads/ instead