Skip to main content

Community author

SnailSploit

GitHub Skill Author at |

Auto-discovered GitHub author from SnailSploit/Claude-Red.

githubagent skills
Author focus2 skills

github.com/SnailSploit

Published skills

What they maintain on Skill Market.

Curator review pending - install with caution.
Skill & Agent BuildingMedium riskReview needed

offensive-iot

IoT and embedded device security testing methodology. Covers hardware reconnaissance (UART, JTAG, SWD, SPI flash, I2C EEPROM, eMMC chip-off), firmware acquisition (vendor portals, OTA capture, flash dump, binwalk extraction), firmware analysis (filesystem mounting, binary triage, hardcoded secrets, default credential discovery), bootloader attacks (U-Boot console, secure-boot bypass, fault injection), runtime attacks on embedded Linux/RTOS (busybox CVEs, MTD writes, /dev/mem), wireless protocol attacks (Zigbee, BLE, Z-Wave, LoRaWAN, Thread/Matter, sub-GHz), MQTT/CoAP/Modbus/BACnet/OPC-UA exploitation, mobile companion app analysis, cloud-IoT API abuse, and side-channel/glitching basics. Use for IoT pentest, smart-home assessment, ICS/OT testing, or embedded vulnerability research.

4.2(8)1.2K installsUpdated May 9, 2026
Best forIoT and embedded device security testing methodology. Covers hardware reconnaissance (UART, JTAG, SWD, SPI flash, I2C EE
Install command
Works inClaude CodeCodex
View source
Audit notesPartial

No curator security note has been written yet.

auto-discoveredgithubstar-1000-plus
Curator review pending - install with caution.
Skill & Agent BuildingMedium riskReview needed

offensive-active-directory

Active Directory attack methodology for internal network red team engagements. Covers reconnaissance (BloodHound, PowerView, ADExplorer), credential abuse (Kerberoasting, ASREProasting, NTLM relay, LLMNR/NBT-NS poisoning), privilege escalation (ACL abuse, GPO abuse, unconstrained/constrained delegation), lateral movement (Pass-the-Hash, Pass-the-Ticket, Overpass-the-Hash, WMI/WinRM/PsExec), persistence (Golden/Silver/Diamond Tickets, DCSync, DCShadow, AdminSDHolder, Skeleton Key), forest trust attacks, ADCS abuse (ESC1-ESC15), and modern MDI/Defender for Identity evasion. Use when assessing on-prem AD, hybrid AD/Entra ID environments, or ADCS deployments.

4.2(8)1.2K installsUpdated May 9, 2026
Best forActive Directory attack methodology for internal network red team engagements. Covers reconnaissance (BloodHound, PowerV
Install command
Works inClaude CodeCodex
View source
Audit notesPartial

No curator security note has been written yet.

auto-discoveredgithubstar-1000-plus