Claude-skill-registry SecLists Fuzzing (Curated)
Essential fuzzing payloads: SQL injection, command injection, special characters. Curated essentials for vulnerability testing.
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/fuzzing" ~/.claude/skills/majiayu000-claude-skill-registry-seclists-fuzzing-curated && rm -rf "$T"
manifest:
skills/data/fuzzing/SKILL.mdsource content
SecLists Fuzzing (Curated)
Description
Essential fuzzing payloads: SQL injection, command injection, special characters. Curated essentials for vulnerability testing.
Source: SecLists/Fuzzing Repository: https://github.com/danielmiessler/SecLists License: MIT
When to Use This Skill
Use this skill when you need:
- SQL injection testing
- Command injection testing
- Input validation testing
- LDAP injection
- NoSQL injection
⚠️ IMPORTANT: Only use for authorized security testing, bug bounty programs, CTF competitions, or educational purposes.
Key Files in This Skill
quick-SQLi.txt - Quick SQL injection testsGeneric-SQLi.txt - Generic SQL injectionsqli.auth.bypass.txt - Authentication bypassMySQL.fuzzdb.txt - MySQL-specific payloadsNoSQL.txt - NoSQL injection payloadscommand-injection-commix.txt - Command injection
Usage Example
# Access files from this skill import os # Example: Load patterns/payloads skill_path = "references/Fuzzing" # List all available files for root, dirs, files in os.walk(skill_path): for file in files: if file.endswith('.txt'): filepath = os.path.join(root, file) print(f"Found: {filepath}") # Read file content with open(filepath, 'r', errors='ignore') as f: content = f.read().splitlines() print(f" Lines: {len(content)}")
Security & Ethics
Authorized Use Cases ✅
- Authorized penetration testing with written permission
- Bug bounty programs (within scope)
- CTF competitions
- Security research in controlled environments
- Testing your own systems
- Educational demonstrations
Prohibited Use Cases ❌
- Unauthorized access attempts
- Testing without permission
- Malicious activities
- Privacy violations
- Any illegal activities
Complete SecLists Collection
This is a curated subset of SecLists. For the complete collection:
- Full repository: https://github.com/danielmiessler/SecLists
- Size: 4.5 GB with 6,000+ files
- All categories: Passwords, Usernames, Discovery, Fuzzing, Payloads, Web-Shells, Pattern-Matching, AI, Miscellaneous
Generated by Skill Seeker | SecLists Fuzzing Collection License: MIT - Use responsibly with proper authorization