Logo
ClawHub Skills Lib
HomeCategoriesUse CasesTrendingBlog
HomeCategoriesUse CasesTrendingBlog
ClawHub Skills Lib
ClawHub Skills Lib

Browse 27,000+ community-built AI agent skills for OpenClaw. Updated daily from clawhub.ai.

Explore

  • Home
  • Trending
  • Use Cases
  • Blog

Categories

  • Development
  • AI & Agents
  • Productivity
  • Communication
  • Data & Research
  • Business
  • Platforms
  • Lifestyle
  • Education
  • Design

Use Cases

  • Security Auditing
  • Workflow Automation
  • Finance & Fintech
  • MCP Integration
  • Crypto Trading
  • Web3 & DeFi
  • Data Analysis
  • Social Media
  • 中文平台技能
  • All Use Cases →
© 2026 ClawHub Skills Lib. All rights reserved.Built with Next.js · Neon · Prisma
Home/Use Cases/🔒 Security & Compliance/🎯 Penetration Testing

🎯 Penetration Testing AI Skills

Automate reconnaissance, exploit research, and security report generation.

14 skillsPart of 🔒 Security & Compliance

14 skills found

🔧pentest

security-reviewer

pentest
Veeramanikandanr48
v1.0.0
View Details

Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews.

13
5.1k
4
7d ago
🔧pentest

Nmap Recon

nmap-recon
nsahal
v1.0.0
View Details

Perform network reconnaissance and port scanning with Nmap to find open ports, detect services, identify vulnerabilities, and enumerate targets accurately.

11
2.1k
21d ago
🔧pentest

Senior Security

senior-security
alirezarezvani
v2.1.1
View Details

Security engineering toolkit for threat modeling, vulnerability analysis, secure architecture, and penetration testing. Includes STRIDE analysis, OWASP guida...

10
1.5k
2
14d ago
🔧pentest

Nmap Pentest Scans

nmap-pentest-scans
0x-Professor
v0.1.0
View Details

Plan and orchestrate authorized Nmap host discovery, port and service enumeration, NSE profiling, and reporting artifacts for in-scope targets.

4
402
7d ago
🔧pentest

Pentest C2 Operator

pentest-c2-operator
0x-Professor
v0.1.0
View Details

Set up authorized C2 simulation workflows and measure defensive detection outcomes.

3
297
22d ago
🔧pentest

Cybersec Helper

cybersec-helper
mcpcentral
v1.0.0
View Details

Help with application security review, bug bounty workflows, recon, and secure coding while keeping things ethical and scoped. Think critically, use real sources only, and reference OWASP.

2
854
22d ago
🔧pentest

web-recon

web-recon
p0lish
v0.1.0
View Details

Website vulnerability scanner and security audit toolkit. Scan any website for security issues: open ports (nmap), exposed secrets, subdomain enumeration, di...

2
297
1
7d ago
🔧pentest

Pentest Api Attacker

pentest-api-attacker
0x-Professor
v0.1.0
View Details

Test APIs against OWASP API Security Top 10 including discovery, auth abuse, and protocol-specific checks.

2
416
1
22d ago
🔧pentest

Auto Security Audit

auto-security-audit
nashbuaa-ops
v1.0.0
View Details

一键自动化安全审计:nmap 端口扫描 + nuclei 12000+ CVE 漏洞检测(内外网双扫)+ SSL/TLS 检查 + SSH/防火墙/fail2ban 系统审计 + Markdown 报告生成。支持 cron 定时扫描 + 飞书推送。

1
183
7d ago
🔧pentest

Prts Sandbox

prts-sandbox
c0ffeeOverdose
v1.0.0
View Details

Isolated Kali Linux sandbox for running pentest tools and risky commands safely.

1
119
16d ago
🔧pentest

Web Security Client-Side Scanner 1773654191

web-front-scanner
enderphan94
v1.0.0
View Details

Perform a thorough client-side / browser-facing security assessment of a target web application. Use this skill whenever the user asks to pentest, audit, or...

0
79
1
7d ago
🔧pentest

Port Scanner

jrv-port-scanner
Johnnywang2001
v1.0.0
View Details

Fast TCP port scanner for network reconnaissance and security auditing. Scan hosts for open ports, detect common services, and identify potential attack surf...

0
77
7d ago
🔧pentest

Tech Security Audit

tech-security-audit
JacquesLauren
v1.0.0
View Details

Performs local network scans using Nmap to detect vulnerabilities, identify service versions, and fingerprint operating systems.

0
742
7d ago
🔧pentest

Cybersecurity Engine

afrexai-cybersecurity-engine
1kalin
v1.0.0
View Details

Complete cybersecurity assessment, threat modeling, and hardening system. Use when conducting security audits, threat modeling, penetration testing, incident...

0
524
25d ago

Other 🔒 Security & Compliance Phases

🔍
Vulnerability Scanning
Scan code and dependencies for CVEs, OWASP issues, and hardcoded secrets.
🔑
Authentication & IAM
Implement OAuth flows, JWT middleware, MFA, and role-based access control.
📋
Compliance & Auditing
Generate compliance reports, audit access logs, and enforce security policies.