Unnamed Skill
Sensitive data patterns for security testing: API keys, credit cards, emails, SSNs, phone numbers, IPs, and more. Use for data discovery and validation.
$ Instalar
git clone https://github.com/Eyadkelleh/awesome-claude-skills-security /tmp/awesome-claude-skills-security && cp -r /tmp/awesome-claude-skills-security/seclists-categories%20pattern-matching/pattern-matching ~/.claude/skills/awesome-claude-skills-security// tip: Run this command in your terminal to install the skill
name: SecLists Pattern-Matching description: Sensitive data patterns for security testing: API keys, credit cards, emails, SSNs, phone numbers, IPs, and more. Use for data discovery and validation.
SecLists Pattern-Matching
Description
Sensitive data patterns for security testing: API keys, credit cards, emails, SSNs, phone numbers, IPs, and more. Use for data discovery and validation.
Source: SecLists/Pattern-Matching Repository: https://github.com/danielmiessler/SecLists License: MIT
When to Use This Skill
Use this skill when you need:
- API key detection in code/logs
- Credit card validation testing
- Email pattern matching
- IP address discovery
- SSN format validation
- Phone number pattern testing
⚠️ IMPORTANT: Only use for authorized security testing, bug bounty programs, CTF competitions, or educational purposes.
Key Files in This Skill
api-keys.txt - API key patternscredit-cards.txt - Credit card formatsemail-addresses.txt - Email patternsip-addresses.txt - IP address patternsssn.txt - Social Security Number patternsphone-numbers.txt - Phone number formats
Usage Example
# Access files from this skill
import os
# Example: Load patterns/payloads
skill_path = "references/Pattern-Matching"
# List all available files
for root, dirs, files in os.walk(skill_path):
for file in files:
if file.endswith('.txt'):
filepath = os.path.join(root, file)
print(f"Found: {filepath}")
# Read file content
with open(filepath, 'r', errors='ignore') as f:
content = f.read().splitlines()
print(f" Lines: {len(content)}")
Security & Ethics
Authorized Use Cases ✅
- Authorized penetration testing with written permission
- Bug bounty programs (within scope)
- CTF competitions
- Security research in controlled environments
- Testing your own systems
- Educational demonstrations
Prohibited Use Cases ❌
- Unauthorized access attempts
- Testing without permission
- Malicious activities
- Privacy violations
- Any illegal activities
Complete SecLists Collection
This is a curated subset of SecLists. For the complete collection:
- Full repository: https://github.com/danielmiessler/SecLists
- Size: 4.5 GB with 6,000+ files
- All categories: Passwords, Usernames, Discovery, Fuzzing, Payloads, Web-Shells, Pattern-Matching, AI, Miscellaneous
Generated by Skill Seeker | SecLists Pattern-Matching Collection License: MIT - Use responsibly with proper authorization
Repository
