picocom

32

Use picocom to interact with IoT device UART consoles for pentesting operations including device enumeration, vulnerability discovery, bootloader manipulation, and gaining root shells. Use when the user needs to interact with embedded devices, IoT hardware, or serial consoles.

Marketplace

Third-Party Agent Skill: Review the code before installing. Agent skills execute in your AI assistant's environment and can access your files. Learn more about security

Installation for Agentic Skill

View all platforms →
skilz install BrownFineSecurity/iothackbot/picocom
skilz install BrownFineSecurity/iothackbot/picocom --agent opencode
skilz install BrownFineSecurity/iothackbot/picocom --agent codex
skilz install BrownFineSecurity/iothackbot/picocom --agent gemini

First time? Install Skilz: pip install skilz

Works with 22+ AI coding assistants

Cursor, Aider, Copilot, Windsurf, Qwen, Kimi, and more...

View All Agents
Download Agent Skill ZIP

Extract and copy to ~/.claude/skills/ then restart Claude Desktop

1. Clone the repository:
git clone https://github.com/BrownFineSecurity/iothackbot
2. Copy the agent skill directory:
cp -r iothackbot/skills/picocom ~/.claude/skills/

Need detailed installation help? Check our platform-specific guides:

Related Agentic Skills

Agentic Skill Details

Repository
iothackbot
Type
Non-Technical
Meta-Domain
general
Primary Domain
general
Sub-Domain
linux device iot
Market Score
32

Report Security Issue

Found a security vulnerability in this agent skill?