Awesome-claude-skills-security SecLists Pattern-Matching
Sensitive data patterns for security testing: API keys, credit cards, emails, SSNs, phone numbers, IPs, and more. Use for data discovery and validation.
install
source · Clone the upstream repo
git clone https://github.com/Eyadkelleh/awesome-claude-skills-security
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/Eyadkelleh/awesome-claude-skills-security "$T" && mkdir -p ~/.claude/skills && cp -r "$T/seclists-categories pattern-matching/pattern-matching" ~/.claude/skills/eyadkelleh-awesome-claude-skills-security-seclists-pattern-matching && rm -rf "$T"
manifest:
seclists-categories pattern-matching/pattern-matching/SKILL.mdsource content
SecLists Pattern-Matching
Description
Sensitive data patterns for security testing: API keys, credit cards, emails, SSNs, phone numbers, IPs, and more. Use for data discovery and validation.
Source: SecLists/Pattern-Matching Repository: https://github.com/danielmiessler/SecLists License: MIT
When to Use This Skill
Use this skill when you need:
- API key detection in code/logs
- Credit card validation testing
- Email pattern matching
- IP address discovery
- SSN format validation
- Phone number pattern testing
⚠️ IMPORTANT: Only use for authorized security testing, bug bounty programs, CTF competitions, or educational purposes.
Key Files in This Skill
api-keys.txt - API key patternscredit-cards.txt - Credit card formatsemail-addresses.txt - Email patternsip-addresses.txt - IP address patternsssn.txt - Social Security Number patternsphone-numbers.txt - Phone number formats
Usage Example
# Access files from this skill import os # Example: Load patterns/payloads skill_path = "references/Pattern-Matching" # List all available files for root, dirs, files in os.walk(skill_path): for file in files: if file.endswith('.txt'): filepath = os.path.join(root, file) print(f"Found: {filepath}") # Read file content with open(filepath, 'r', errors='ignore') as f: content = f.read().splitlines() print(f" Lines: {len(content)}")
Security & Ethics
Authorized Use Cases ✅
- Authorized penetration testing with written permission
- Bug bounty programs (within scope)
- CTF competitions
- Security research in controlled environments
- Testing your own systems
- Educational demonstrations
Prohibited Use Cases ❌
- Unauthorized access attempts
- Testing without permission
- Malicious activities
- Privacy violations
- Any illegal activities
Complete SecLists Collection
This is a curated subset of SecLists. For the complete collection:
- Full repository: https://github.com/danielmiessler/SecLists
- Size: 4.5 GB with 6,000+ files
- All categories: Passwords, Usernames, Discovery, Fuzzing, Payloads, Web-Shells, Pattern-Matching, AI, Miscellaneous
Generated by Skill Seeker | SecLists Pattern-Matching Collection License: MIT - Use responsibly with proper authorization