From communitytools
Identifies company tech stacks via OSINT passive reconnaissance across 17 intelligence domains. Infers frontend, backend, infrastructure, security, devops, and third-party technologies with evidence and confidence scores.
npx claudepluginhub transilienceai/communitytoolsThis skill uses the workspace's default tool permissions.
Passive OSINT reconnaissance to identify a target's technology stack. No credentials, no active scanning — only publicly available signals.
Guides OSINT for red teaming: enumerates domains/IPs/cloud assets, employees, leaked credentials, tech stacks, physical sites from public sources.
Performs OSINT gathering for red team engagements, enumerating domains, IPs, employees, leaked credentials, tech stacks, and physical locations to map attack surfaces.
Conducts OSINT reconnaissance on target organizations to enumerate domains, employees, leaked credentials, tech stacks, and attack surfaces for red team exercises.
Share bugs, ideas, or general feedback.
Passive OSINT reconnaissance to identify a target's technology stack. No credentials, no active scanning — only publicly available signals.
1. Provide company name (+ optional domain hint)
2. 5 coordinating agents run 26 sub-skills across 17 intelligence domains
3. Signals correlated, confidence scored, conflicts resolved
4. Final report: JSON + Markdown with evidence for every inference
Phase 1: Asset Discovery (asset_discovery_agent)
Phase 2: Data Collection (data_collection_agent)
Phase 3: Tech Inference (tech_inference_agent)
Phase 4: Correlation (correlation_agent)
Phase 5: Report (report_generation_agent)
formats/techstack-json-report.md, formats/techstack-evidence-formatter.md, formats/techstack-report-exporter.mdPhases run sequentially. Sub-skills within each phase run in parallel.
{
"report_id": "uuid",
"company": "string",
"primary_domain": "string",
"discovered_assets": { "domains", "subdomains", "ip_addresses", "certificates", "api_portals" },
"technologies": {
"frontend": [{ "name", "version?", "confidence": "High|Medium|Low", "evidence": [...] }],
"backend": [...],
"infrastructure": [...],
"security": [...],
"devops": [...],
"third_party": [...]
},
"confidence_summary": { "high_confidence", "medium_confidence", "low_confidence", "overall_score" }
}
| Service | Limit |
|---|---|
| crt.sh | 10 req/min |
| GitHub API (unauth) | 60 req/hr |
| General HTTP | 30 req/min |
| DNS queries | 30 req/min |
Called by pentest coordinator as a recon step, by CVE testing to map technologies to CVEs, or standalone for due diligence and competitive analysis.