Jump to related tools in the same category or review the original source on GitHub.

Security & Passwords @malvex007 Updated 2/26/2026

āš”ļø Shadow Strike Security OpenClaw Skill - ClawHub

Do you want your AI agent to automate Shadow Strike Security workflows? This free skill from ClawHub helps with security & passwords tasks without building custom tools from scratch.

What this skill does

Elite penetration testing platform with 600+ security tools

Install

npx clawhub@latest install shadow-strike-security

Full SKILL.md

Open original
namedescription
shadowstrike-securityElite penetration testing platform with 600+ security tools

ShadowStrike Security

Elite Penetration Testing & Security Assessment Platform

Transform OpenClaw into a professional security operations center with 600+ Kali Linux tools, intelligent orchestration, and automated reporting.

What is ShadowStrike?

ShadowStrike is a comprehensive security testing platform that provides:

  • Intelligent Tool Orchestration - Auto-selects best tools for each task
  • Complete PT Lifecycle - From reconnaissance to professional reporting
  • 600+ Security Tools - Full Kali Linux arsenal at your fingertips
  • Automated Workflows - One command executes entire assessments

Key Features

šŸŽÆ Intelligent Reconnaissance

  • Network Discovery: nmap, masscan, unicornscan
  • Web Enumeration: dirb, gobuster, ffuf, wfuzz
  • Subdomain Hunting: amass, sublist3r, assetfinder
  • OSINT Gathering: theHarvester, recon-ng, maltego

šŸ” Vulnerability Assessment

  • Web Testing: sqlmap, nikto, dalfox, nuclei
  • Network Scanning: 610+ NSE scripts
  • SSL/TLS Analysis: testssl.sh, sslscan, sslyze
  • Configuration Review: Automated misconfiguration detection

āš”ļø Professional Exploitation

  • Web Exploits: SQL injection, XSS, LFI, RCE testing
  • Password Attacks: hashcat, john, hydra (GPU-accelerated)
  • Wireless Auditing: aircrack-ng, wifite, reaver
  • Frameworks: Metasploit, searchsploit, BeEF

šŸ›”ļø Post-Exploitation

  • Privilege Escalation: linpeas, winpeas
  • Lateral Movement: Pivoting and tunneling
  • Persistence Testing: Backdoor detection
  • Data Exfiltration: Secure transfer methods

šŸ“Š Professional Reporting

  • Executive Summaries: High-level risk overview
  • Technical Reports: CVE correlation, PoC details
  • Remediation Guides: Step-by-step fixes
  • Evidence Collection: Screenshots and logs

Quick Start

Installation

cp -r shadowstrike-security ~/.openclaw/skills/

Add to agent config:

{
  "skills": ["shadowstrike-security"]
}

Restart:

pkill -f "openclaw gateway" && openclaw gateway &

First Commands

"scan target.com"          → Quick port scan
"web target.com"           → Web application test
"pentest target.com"       → Full penetration test
"wifi"                     → WiFi security audit
"hashes crack hash.txt"    → Password cracking

Command Reference

Network Assessment

Command Description Example Output
scan [target] Quick port scan Ports: 22,80,443
deep [target] Full port scan (all 65,535) [Complete scan]
services [target] Service detection 80:nginx, 3306:mysql
os [target] OS fingerprinting Linux 5.4

Web Application Testing

Command Description Example Output
web [target] Full web app test SQLi found, XSS medium
dirb [target] Directory discovery /admin, /api, /config
sql [target] SQL injection test Vulnerable: id parameter
xss [target] XSS testing Reflected XSS confirmed
vuln [target] Vulnerability scan Critical: 2, High: 5

Complete Workflows

Command Description Duration
pentest [target] Full PT lifecycle 10-30 min
bugbounty [target] Bug bounty hunting 15-45 min
audit [network] Network security audit 20-60 min
compliance [target] Compliance check 30-90 min

Specialized Tools

Command Description
wifi WiFi security audit
hashes [file] Crack password hashes
exploit [cve] Search and run exploits
report Generate security report

How It Works

Intelligent Tool Selection

ShadowStrike automatically chooses the best tools:

For Web Targets:

Input: "test web target.com"
ShadowStrike:
  1. whatweb → Technology fingerprinting
  2. dirb → Directory discovery
  3. nikto → Vulnerability scanning
  4. sqlmap → SQL injection test
  5. dalfox → XSS testing
  6. nuclei → CVE scanning
Output: "Critical: 2, High: 5, Report: ./target-security.md"

For Network Targets:

Input: "scan 192.168.1.0/24"
ShadowStrike:
  1. nmap -sS → Port scanning
  2. nmap -sV → Service detection
  3. nmap -O → OS fingerprinting
  4. nmap --script=vulners → Vuln detection
Output: "Hosts: 15, Open ports: 47, Vulnerabilities: 12"

Tool Arsenal

Information Gathering (50+ tools)

nmap, masscan, unicornscan, zmap
theHarvester, recon-ng, maltego
amass, sublist3r, assetfinder, findomain

Web Testing (60+ tools)

nikto, sqlmap, burpsuite, zap
dirb, gobuster, wfuzz, ffuf
dalfox, xsser, nuclei, arachni
wpscan, joomscan, droopescan

Password Attacks (30+ tools)

hashcat (GPU-accelerated), john, hydra
medusa, ncrack, patator, crowbar
crunch, cewl, cupp (wordlist generators)

Wireless (25+ tools)

aircrack-ng, wifite, reaver, bully
kismet, wireshark, airmon-ng
hostapd-wpe, freeradius-wpe

Exploitation (35+ tools)

metasploit, searchsploit, beef
setoolkit, sqlmap, commix
routersploit, exploitdb

Forensics (40+ tools)

autopsy, sleuthkit, volatility
foremost, scalpel, binwalk
yara, cuckoo, remnux, ghidra

Workflow Examples

Example 1: Bug Bounty Hunting

You: "bugbounty target.com"

ShadowStrike executes:
āœ“ Subdomain enumeration (amass, sublist3r)
āœ“ Screenshot all services
āœ“ Technology fingerprinting
āœ“ Vulnerability scanning (nikto, nuclei)
āœ“ SQL injection testing (sqlmap)
āœ“ XSS testing (dalfox, xsser)
āœ“ SSL/TLS analysis (testssl.sh)

Results:
šŸ’° Critical (P1): 1 - SQL Injection
šŸ’° High (P2): 3 - XSS, IDOR, LFI
šŸ’° Medium (P3): 5 - Various issues

Reports:
šŸ“„ P1-SQLi-report.md (Ready to submit)
šŸ“„ P2-XSS-report.md (Ready to submit)
šŸ“„ P2-IDOR-report.md (Ready to submit)

Potential Bounty: $2,000 - $5,000

Example 2: Network Security Audit

You: "audit 192.168.1.0/24"

ShadowStrike executes:
āœ“ Host discovery (nmap -sn)
āœ“ Port scanning (nmap -sS -p-)
āœ“ Service detection (nmap -sV)
āœ“ OS fingerprinting (nmap -O)
āœ“ Vulnerability scanning (nmap --script=vulners)
āœ“ SSL testing (testssl.sh)
āœ“ Default credential testing

Results:
Hosts Found: 23
Open Ports: 147
Services: 89
Vulnerabilities: 34 (Critical: 3, High: 8, Medium: 23)

Report: ./network-audit-report.md

Example 3: Full Penetration Test

You: "pentest target.com"

Phase 1: Reconnaissance (5 min)
āœ“ Subdomain enumeration
āœ“ IP range discovery
āœ“ Technology stack identification
āœ“ DNS enumeration

Phase 2: Scanning (10 min)
āœ“ Port scanning
āœ“ Service detection
āœ“ OS fingerprinting

Phase 3: Enumeration (10 min)
āœ“ User enumeration
āœ“ Share discovery
āœ“ Directory brute-forcing

Phase 4: Vulnerability Assessment (15 min)
āœ“ Automated scanning
āœ“ Manual verification
āœ“ Exploit research

Phase 5: Exploitation (10 min)
āœ“ Attempt exploitation
āœ“ Proof of concept
āœ“ Credential testing

Phase 6: Post-Exploitation (10 min)
āœ“ Privilege escalation testing
āœ“ Lateral movement
āœ“ Data collection

Phase 7: Reporting (5 min)
āœ“ Executive summary
āœ“ Technical findings
āœ“ Risk ratings
āœ“ Remediation steps

Final Report:
Security Score: 68/100
Critical: 2, High: 5, Medium: 8, Low: 12

Full Report: ./pentest-target-report.md
Remediation: ./pentest-target-remediation.md
Evidence: ./pentest-target-evidence/

Legal & Ethics

āš ļø IMPORTANT: Use Responsibly

You CAN:

  • āœ… Test systems you own
  • āœ… Test systems with written authorization
  • āœ… Conduct authorized penetration tests
  • āœ… Perform security audits on your infrastructure
  • āœ… Participate in bug bounty programs (within scope)

You CANNOT:

  • āŒ Test systems without permission
  • āŒ Attack systems illegally
  • āŒ Violate privacy laws
  • āŒ Cause damage to systems
  • āŒ Steal data

Legal Notice: Unauthorized access is illegal under:

  • Computer Fraud and Abuse Act (CFAA)
  • Computer Misuse Act (UK)
  • Similar laws worldwide

Always obtain proper authorization before testing.

Requirements

  • OpenClaw >= 2026.2.3
  • Kali Linux 2024.x (recommended)
  • Sudo access for privileged operations
  • 4GB RAM minimum (8GB recommended)
  • 20GB free disk space

License

MIT License - Free for educational and authorized security testing


ShadowStrike Security: Professional Tools for Professional Testing āš”ļøšŸ›”ļø

Original URL: https://github.com/openclaw/skills/blob/main/skills/malvex007/shadow-strike-security

Related skills

If this matches your use case, these are close alternatives in the same category.