gadget-inventory
CommunityMap bug-to-bug relationships for chaining.
Software Engineering#vulnerability management#attack surface#bug bounty#security research#exploit chaining#gadget inventory
Authorovertimepog
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill helps security researchers and bug bounty hunters systematically identify and catalog vulnerabilities that can be chained together to create more impactful exploits, turning low-severity findings into critical ones.
Core Features & Use Cases
- Vulnerability Gadget Cataloging: Maintain a structured inventory of all findings, noting their potential to enable or be enabled by other vulnerabilities.
- Automated Chain Analysis: Automatically analyze the inventory to discover potential exploit chains based on defined
providesandrequirescapabilities. - Use Case: A researcher finds a subdomain takeover (MEDIUM) and a wildcard CORS misconfiguration (MEDIUM) on related subdomains. This skill can identify that the takeover provides a
trusted_originandjs_hostingcapability, which satisfies therequiresfor the CORS vulnerability, leading to a HIGH-severity authenticated data theft chain.
Quick Start
Use the gadget-inventory skill to analyze all existing gadgets for chaining opportunities.
Dependency Matrix
Required Modules
None requiredComponents
references
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: gadget-inventory Download link: https://github.com/overtimepog/greyhatcc/archive/main.zip#gadget-inventory Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.