pentest-coordinator
Automate Penetration Testing with ReAct Methodology
This skill provides structured autonomous penetration testing using ReAct loops. It maintains state, applies specialized security knowledge, and coordinates reconnaissance, exploitation, and privilege escalation until both flags are captured.
Baixar o ZIP da skill
Upload no Claude
Vá em Configurações → Capacidades → Skills → Upload skill
Ative e comece a usar
Testar
A utilizar "pentest-coordinator". Start penetration testing on 10.10.10.1
Resultado esperado:
- Initializing state for target 10.10.10.1
- Starting reconnaissance phase with port scanning
- Discovered services: SSH(22), HTTP(80), MySQL(3306)
- Exploiting HTTP file upload vulnerability
- Captured user flag: a1b2c3d4e5f6g7h8i9j0k1l2m3n4o5p6
- Escalating privileges via sudo vim exploit
- Captured root flag: f6e5d4c3b2a1098765432109876543210
- Mission complete - both flags captured
A utilizar "pentest-coordinator". Perform AD testing on 10.10.10.50
Resultado esperado:
- Initializing AD-focused reconnaissance
- Discovered PASSWD_NOTREQD flag on user account
- Investigating anomaly with forced ChangePassword capability
- Successfully exploited password reset vulnerability
- Captured user flag and escalated to Domain Admin
- Mission complete - full domain compromise achieved
Auditoria de Segurança
Alto RiscoLegitimate penetration testing framework designed for CTF and lab environments. Contains offensive security capabilities (network scanning, exploitation, privilege escalation) but includes safety mechanisms (password budgets, time limits, circuit breakers). Static findings confirm legitimate pentesting tool patterns - no malicious intent detected. Designed for authorized testing only per documentation.
Problemas de Risco Médio (1)
Fatores de risco
⚙️ Comandos externos (2)
🌐 Acesso à rede (2)
📁 Acesso ao sistema de arquivos (2)
Pontuação de qualidade
O Que Você Pode Construir
Automate CTF Box Solving
Automatically solve penetration testing challenges in competitive environments using systematic methodology
Learn Structured Pentesting
Understand proper penetration testing methodology through autonomous demonstration and state tracking
Test Vulnerable Applications
Validate security controls in intentionally vulnerable applications within controlled laboratory environments
Tente Estes Prompts
Start penetration testing on target 10.10.10.1 and capture both user and root flags
Resume penetration testing from current state and continue until both flags are captured
Perform AD-focused penetration testing on target 10.10.10.50, investigating all anomalies found
Use extended thinking to analyze all reconnaissance data and generate new attack hypotheses
Melhores Práticas
- Only use on systems you own or have explicit written authorization to test
- Let the skill run autonomously without interruption for best results
- Review the state file to understand the decision-making process
Evitar
- Never use on production systems or any unauthorized targets
- Do not interrupt the autonomous testing flow once started
- Avoid modifying the state file during active execution
Perguntas Frequentes
Is this skill safe to use?
What are the password attempt limits?
Can I use this on any target?
How does the stuck counter work?
What happens when flags are captured?
Is this suitable for learning pentesting?
Detalhes do Desenvolvedor
Autor
CharlesKozelLicença
MIT
Repositório
https://github.com/CharlesKozel/vulhub_automated_pentester/tree/main/agents/claude/skills/coordinatorReferência
main
Estrutura de arquivos