Searching protocol for "vulnerability discovery"
Systematically discover LLM vulnerabilities.
Automate Recon & Vulnerability Discovery
Find web vulnerabilities.
Comprehensive security analysis with sub-skills.
Master mobile security with HackerOne case studies.
Proactive vulnerability discovery.
Guided security scanning with proven tools.
Automate bug bounty hunting end-to-end.
Pen-test REST/GraphQL APIs with auth & abuse checks.
Mobile app pentesting, made actionable.
Scan for vulnerabilities with Nuclei templates.
Automate red-team recon and bug bounty workflows.