Tool & Utility Skills
Reference for all tool skills and utility commands available in Claude Code. Each skill wraps the project’s bash scripts with AI-guided execution.
How Tool Skills Work
Section titled “How Tool Skills Work”Invoke any tool skill with a target:
/nmap localhost/sqlmap http://localhost:8080/vulnerabilities/sqli/?id=1/dig example.comWhen you invoke a skill:
- Claude loads the skill’s instructions (what scripts are available, what flags to use)
- Claude runs the appropriate wrapper script with
-j -xflags - The PreToolUse hook validates the target against
.pentest/scope.json - The script executes and produces structured JSON output
- The PostToolUse hook parses the JSON and provides Claude with a structured summary
All tool skills use disable-model-invocation: true, meaning they add zero context overhead until you actually invoke them.
Security Tools
Section titled “Security Tools”Nmap — Network Scanner
Section titled “Nmap — Network Scanner”Skill: /nmap <target>
Scans networks for hosts, open ports, and running services.
Available scripts:
discover-live-hosts.sh— find active hosts using ping sweeps, ARP, and ICMP probesidentify-ports.sh— scan for open ports and detect servicesscan-web-vulnerabilities.sh— detect web vulnerabilities using NSE scriptsexamples.sh— 10 common nmap patterns with explanations
Default target: localhost
TShark — Packet Analyzer
Section titled “TShark — Packet Analyzer”Skill: /tshark <interface-or-pcap>
Captures and analyzes network traffic from a live interface or pcap file.
Available scripts:
capture-http-credentials.sh— capture HTTP auth headers, form submissions, cookiesanalyze-dns-queries.sh— analyze DNS query patterns and detect anomaliesextract-files-from-capture.sh— extract transferred files from trafficexamples.sh— 10 common tshark patterns with explanations
Note: Live capture requires root or capture group membership.
Metasploit — Penetration Testing Framework
Section titled “Metasploit — Penetration Testing Framework”Skill: /metasploit <target>
Exploit development, payload generation, and network service scanning.
Available scripts:
scan-network-services.sh— scan for vulnerable servicesgenerate-reverse-shell.sh— generate reverse shell payloadssetup-listener.sh— configure Metasploit listenersexamples.sh— 10 common Metasploit patterns with explanations
Hashcat — GPU Password Cracking
Section titled “Hashcat — GPU Password Cracking”Skill: /hashcat <hashfile>
GPU-accelerated password recovery for various hash types.
Available scripts:
crack-ntlm-hashes.sh— crack Windows NTLM hashescrack-web-hashes.sh— crack MD5, SHA, bcrypt, WordPress, Django hashesbenchmark-gpu.sh— benchmark GPU cracking performanceexamples.sh— 10 common hashcat patterns with explanations
Note: Operates on local files. No network scope validation needed.
John the Ripper — Password Cracker
Section titled “John the Ripper — Password Cracker”Skill: /john <hashfile>
Versatile password cracking with format auto-detection.
Available scripts:
identify-hash-type.sh— identify hash algorithm before crackingcrack-linux-passwords.sh— crack /etc/shadow hashescrack-archive-passwords.sh— crack ZIP, RAR, 7z, PDF passwordsexamples.sh— 10 common John patterns with explanations
Note: Operates on local files. No network scope validation needed.
SQLMap — SQL Injection
Section titled “SQLMap — SQL Injection”Skill: /sqlmap <url>
Automatic SQL injection detection and database exploitation.
Available scripts:
test-all-parameters.sh— test all URL parameters for injectiondump-database.sh— extract database contents after finding injectionbypass-waf.sh— bypass web application firewallsexamples.sh— 10 common sqlmap patterns with explanations
Nikto — Web Server Scanner
Section titled “Nikto — Web Server Scanner”Skill: /nikto <target>
Scans web servers for known vulnerabilities, misconfigurations, and dangerous files.
Available scripts:
scan-specific-vulnerabilities.sh— targeted vulnerability scanningscan-multiple-hosts.sh— scan multiple web serversscan-with-auth.sh— authenticated scanning with cookies or credentialsexamples.sh— 10 common nikto patterns with explanations
hping3 — Packet Crafter
Section titled “hping3 — Packet Crafter”Skill: /hping3 <target>
TCP/IP packet crafting for firewall testing and network probing.
Available scripts:
test-firewall-rules.sh— test firewall rules with crafted packetsdetect-firewall.sh— detect firewall presence and typeexamples.sh— 10 common hping3 patterns with explanations
Note: Requires root for raw packet crafting.
Aircrack-ng — WiFi Auditing
Section titled “Aircrack-ng — WiFi Auditing”Skill: /aircrack-ng <interface-or-capture>
WiFi network security auditing and WPA/WPA2 cracking.
Available scripts:
analyze-wireless-networks.sh— scan and enumerate wireless networkscapture-handshake.sh— capture WPA handshakes for offline crackingcrack-wpa-handshake.sh— crack captured WPA handshakesexamples.sh— 10 common aircrack-ng patterns with explanations
Note: Monitor mode requires root on Linux. Limited on macOS.
Skipfish — Web Application Scanner
Section titled “Skipfish — Web Application Scanner”Skill: /skipfish <url>
Active web application security reconnaissance scanner.
Available scripts:
quick-scan-web-app.sh— fast web application scanscan-authenticated-app.sh— scan with authentication cookiesexamples.sh— 10 common skipfish patterns with explanations
Foremost — File Carver
Section titled “Foremost — File Carver”Skill: /foremost <image-file>
File carving and data recovery from disk images and raw data.
Available scripts:
examples.sh— 10 common foremost patterns with explanations
Note: Operates on local files. No network scope validation needed.
ffuf — Web Fuzzer
Section titled “ffuf — Web Fuzzer”Skill: /ffuf <url>
Fast web fuzzer for directory discovery and parameter brute-forcing.
Available scripts:
fuzz-parameters.sh— fuzz URL parameters, headers, and request bodiesexamples.sh— 10 common ffuf patterns with explanations
Gobuster — Content Discovery
Section titled “Gobuster — Content Discovery”Skill: /gobuster <target>
Directory, DNS, and virtual host brute-force discovery.
Available scripts:
discover-directories.sh— brute-force web directories and filesenumerate-subdomains.sh— enumerate subdomains via DNSexamples.sh— 10 common gobuster patterns with explanations
Networking Tools
Section titled “Networking Tools”curl — HTTP Client
Section titled “curl — HTTP Client”Skill: /curl <url>
HTTP requests, endpoint testing, and SSL certificate inspection.
Available scripts:
test-http-endpoints.sh— test endpoints for security headers and misconfigurationscheck-ssl-certificate.sh— inspect SSL certificate detailsexamples.sh— 10 common curl patterns with explanations
dig — DNS Lookup
Section titled “dig — DNS Lookup”Skill: /dig <domain>
DNS record queries, zone transfers, and propagation checks.
Available scripts:
query-dns-records.sh— query A, MX, NS, TXT, CNAME recordsattempt-zone-transfer.sh— attempt DNS zone transfercheck-dns-propagation.sh— check propagation across public resolversexamples.sh— 10 common dig patterns with explanations
Netcat — Network Swiss Army Knife
Section titled “Netcat — Network Swiss Army Knife”Skill: /netcat <target>
Network connections, port scanning, file transfers, and listeners.
Available scripts:
examples.sh— 10 common netcat patterns with explanations
Traceroute — Route Tracing
Section titled “Traceroute — Route Tracing”Skill: /traceroute <target>
Network path tracing and hop-by-hop latency analysis.
Available scripts:
trace-network-path.sh— trace path with latency per hopexamples.sh— 10 common traceroute patterns with explanations
Utility Skills
Section titled “Utility Skills”/check-tools
Section titled “/check-tools”Verify which of the 18 pentesting and networking tools are installed on your system.
/check-toolsNo arguments needed. Reports installed tools with versions and shows install instructions for missing ones.
Manage the Docker-based vulnerable practice lab.
/lab start # Start all containers/lab stop # Stop all containers/lab status # Show running statusLab targets:
| Service | URL | Credentials |
|---|---|---|
| DVWA | http://localhost:8080 | admin / password |
| Juice Shop | http://localhost:3030 | (register) |
| WebGoat | http://localhost:8888/WebGoat | (register) |
| VulnerableApp | http://localhost:8180 | — |
/netsec-health
Section titled “/netsec-health”Run the safety architecture health check. Unlike other skills, this one loads automatically (it does not use disable-model-invocation).
/netsec-healthChecks five categories: hook files, hook registration, scope configuration, audit infrastructure, and dependencies. See Safety & Scope for details on each check.
Common Patterns
Section titled “Common Patterns”Target defaults: Most tool skills default to localhost when no target is provided.
Missing tools: If a tool is not installed, Claude skips that step and notes it in the output. Run /check-tools to see what is available.
JSON output: All skills instruct Claude to add -j for structured JSON output. The PostToolUse hook parses this and gives Claude an organized summary instead of raw terminal output.
Execute mode: Skills add -x to actually run commands. Without -x, scripts display example commands without executing them.