mirror of
https://github.com/sickn33/antigravity-awesome-skills.git
synced 2026-04-25 17:25:12 +02:00
chore: sync repo state [ci skip]
This commit is contained in:
@@ -571,6 +571,7 @@ We officially thank the following contributors for their help in making this rep
|
||||
- [@Imasaikiran](https://github.com/Imasaikiran)
|
||||
- [@justmiroslav](https://github.com/justmiroslav)
|
||||
- [@1bcMax](https://github.com/1bcMax)
|
||||
- [@xiaolai](https://github.com/xiaolai)
|
||||
|
||||
## Star History
|
||||
|
||||
|
||||
@@ -11541,7 +11541,7 @@
|
||||
"category": "security",
|
||||
"name": "ethical-hacking-methodology",
|
||||
"description": "Master the complete penetration testing lifecycle from reconnaissance through reporting. This skill covers the five stages of ethical hacking methodology, essential tools, attack techniques, and professional reporting for authorized security assessments.",
|
||||
"risk": "unknown",
|
||||
"risk": "offensive",
|
||||
"source": "community",
|
||||
"date_added": "2026-02-27",
|
||||
"plugin": {
|
||||
|
||||
@@ -1,12 +1,14 @@
|
||||
---
|
||||
name: ethical-hacking-methodology
|
||||
description: "Master the complete penetration testing lifecycle from reconnaissance through reporting. This skill covers the five stages of ethical hacking methodology, essential tools, attack techniques, and professional reporting for authorized security assessments."
|
||||
risk: unknown
|
||||
risk: offensive
|
||||
source: community
|
||||
author: zebbern
|
||||
date_added: "2026-02-27"
|
||||
---
|
||||
|
||||
> AUTHORIZED USE ONLY: Use this skill only for authorized penetration testing engagements, defensive validation, or controlled educational environments.
|
||||
|
||||
# Ethical Hacking Methodology
|
||||
|
||||
## Purpose
|
||||
|
||||
@@ -1,12 +1,14 @@
|
||||
---
|
||||
name: ethical-hacking-methodology
|
||||
description: "Master the complete penetration testing lifecycle from reconnaissance through reporting. This skill covers the five stages of ethical hacking methodology, essential tools, attack techniques, and professional reporting for authorized security assessments."
|
||||
risk: unknown
|
||||
risk: offensive
|
||||
source: community
|
||||
author: zebbern
|
||||
date_added: "2026-02-27"
|
||||
---
|
||||
|
||||
> AUTHORIZED USE ONLY: Use this skill only for authorized penetration testing engagements, defensive validation, or controlled educational environments.
|
||||
|
||||
# Ethical Hacking Methodology
|
||||
|
||||
## Purpose
|
||||
|
||||
@@ -1,12 +1,14 @@
|
||||
---
|
||||
name: ethical-hacking-methodology
|
||||
description: "Master the complete penetration testing lifecycle from reconnaissance through reporting. This skill covers the five stages of ethical hacking methodology, essential tools, attack techniques, and professional reporting for authorized security assessments."
|
||||
risk: unknown
|
||||
risk: offensive
|
||||
source: community
|
||||
author: zebbern
|
||||
date_added: "2026-02-27"
|
||||
---
|
||||
|
||||
> AUTHORIZED USE ONLY: Use this skill only for authorized penetration testing engagements, defensive validation, or controlled educational environments.
|
||||
|
||||
# Ethical Hacking Methodology
|
||||
|
||||
## Purpose
|
||||
|
||||
@@ -11541,7 +11541,7 @@
|
||||
"category": "security",
|
||||
"name": "ethical-hacking-methodology",
|
||||
"description": "Master the complete penetration testing lifecycle from reconnaissance through reporting. This skill covers the five stages of ethical hacking methodology, essential tools, attack techniques, and professional reporting for authorized security assessments.",
|
||||
"risk": "unknown",
|
||||
"risk": "offensive",
|
||||
"source": "community",
|
||||
"date_added": "2026-02-27",
|
||||
"plugin": {
|
||||
|
||||
Reference in New Issue
Block a user