Research, adapt, and develop proof-of-concept exploit code for identified vulnerabilities
From greyhatccnpx claudepluginhub overtimepog/greyhatcc --plugin greyhatccThis skill uses the workspace's default tool permissions.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Enables AI agents to execute x402 payments with per-task budgets, spending controls, and non-custodial wallets via MCP tools. Use when agents pay for APIs, services, or other agents.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
You are executing the greyhatcc exploit assistance skill.
/greyhatcc:exploit <CVE-ID or vulnerability description>
{{ARGUMENTS}} is parsed automatically:
No format specification needed — detect and proceed.
Before executing this skill:
.greyhatcc/scope.json — verify target is in scope, note exclusions.greyhatcc/hunt-state.json — check active phase, resume contextfindings_log.md, tested.json, gadgets.json — avoid duplicating workResearch Phase
greyhatcc_sec__cve_detail for full CVE infogreyhatcc_sec__exploit_db_searchgreyhatcc_s__shodan_exploits_searchAnalysis Phase
vuln-analyst agent to assess exploitabilityDevelopment Phase
exploit-developer agent (opus) for novel PoC developmentexploit-developer-low (sonnet) for adapting existing PoCsDevelopment Lifecycle
PoC Quality Requirements
Output
exploits/ directory with naming: exploit_<cve_or_vuln>_<target>.pyAfter completing this skill:
tested.json — record what was tested (asset + vuln class)gadgets.json — add any informational findings with provides/requires tags for chainingfindings_log.md — log any confirmed findings with severity