chore: sync repo state [ci skip]

This commit is contained in:
github-actions[bot]
2026-04-20 17:58:57 +00:00
parent 34e846c2df
commit c8259b6eb3
6 changed files with 12 additions and 5 deletions

View File

@@ -571,6 +571,7 @@ We officially thank the following contributors for their help in making this rep
- [@Imasaikiran](https://github.com/Imasaikiran)
- [@justmiroslav](https://github.com/justmiroslav)
- [@1bcMax](https://github.com/1bcMax)
- [@xiaolai](https://github.com/xiaolai)
## Star History

View File

@@ -11541,7 +11541,7 @@
"category": "security",
"name": "ethical-hacking-methodology",
"description": "Master the complete penetration testing lifecycle from reconnaissance through reporting. This skill covers the five stages of ethical hacking methodology, essential tools, attack techniques, and professional reporting for authorized security assessments.",
"risk": "unknown",
"risk": "offensive",
"source": "community",
"date_added": "2026-02-27",
"plugin": {

View File

@@ -1,12 +1,14 @@
---
name: ethical-hacking-methodology
description: "Master the complete penetration testing lifecycle from reconnaissance through reporting. This skill covers the five stages of ethical hacking methodology, essential tools, attack techniques, and professional reporting for authorized security assessments."
risk: unknown
risk: offensive
source: community
author: zebbern
date_added: "2026-02-27"
---
> AUTHORIZED USE ONLY: Use this skill only for authorized penetration testing engagements, defensive validation, or controlled educational environments.
# Ethical Hacking Methodology
## Purpose

View File

@@ -1,12 +1,14 @@
---
name: ethical-hacking-methodology
description: "Master the complete penetration testing lifecycle from reconnaissance through reporting. This skill covers the five stages of ethical hacking methodology, essential tools, attack techniques, and professional reporting for authorized security assessments."
risk: unknown
risk: offensive
source: community
author: zebbern
date_added: "2026-02-27"
---
> AUTHORIZED USE ONLY: Use this skill only for authorized penetration testing engagements, defensive validation, or controlled educational environments.
# Ethical Hacking Methodology
## Purpose

View File

@@ -1,12 +1,14 @@
---
name: ethical-hacking-methodology
description: "Master the complete penetration testing lifecycle from reconnaissance through reporting. This skill covers the five stages of ethical hacking methodology, essential tools, attack techniques, and professional reporting for authorized security assessments."
risk: unknown
risk: offensive
source: community
author: zebbern
date_added: "2026-02-27"
---
> AUTHORIZED USE ONLY: Use this skill only for authorized penetration testing engagements, defensive validation, or controlled educational environments.
# Ethical Hacking Methodology
## Purpose

View File

@@ -11541,7 +11541,7 @@
"category": "security",
"name": "ethical-hacking-methodology",
"description": "Master the complete penetration testing lifecycle from reconnaissance through reporting. This skill covers the five stages of ethical hacking methodology, essential tools, attack techniques, and professional reporting for authorized security assessments.",
"risk": "unknown",
"risk": "offensive",
"source": "community",
"date_added": "2026-02-27",
"plugin": {