From pentest-framework
Tests target web apps for advanced vulnerabilities: HTTP request smuggling, race conditions, cache poisoning, subdomain takeover. Reports exploits, impacts, remediations via pentest tool.
npx claudepluginhub sabania/pentest-cli --plugin pentest-frameworkThis skill is limited to using the following tools:
Test a target application for advanced attack vectors including HTTP request smuggling, race conditions, cache poisoning, and subdomain takeover vulnerabilities.
Guides authorized pentests for web cache poisoning by discovering unkeyed headers/parameters with Burp Suite Param Miner and testing cache keys via curl on CDNs like Cloudflare/Nginx.
Guides authorized pentests for web cache poisoning by exploiting unkeyed headers/parameters in CDNs/proxies (Cloudflare, Varnish, Nginx) using Burp Suite and curl.
Guides web penetration testing for request forgery vulnerabilities like CSRF, HTTP request smuggling, CRLF injection, and clickjacking. Includes exploitation patterns, bypasses, and detection checklists.
Share bugs, ideas, or general feedback.
Test a target application for advanced attack vectors including HTTP request smuggling, race conditions, cache poisoning, and subdomain takeover vulnerabilities.
The target URL is provided via $ARGUMENTS. If no URL is provided, ask the user for one.
Parse the target URL from $ARGUMENTS.
Delegate to advanced-agent using the Agent tool. The agent must run all advanced attack commands:
pentest -k -j -o ./findings advanced smuggle --active --yes <url>
pentest -k -j -o ./findings advanced race --active --yes <url>
pentest -k -j -o ./findings advanced cache --active --yes <url>
pentest -k -j -o ./findings advanced takeover --active --yes <url>
Read the JSON outputs from ./findings/ to gather all results.
Present findings with detailed exploitation scenarios:
For each confirmed vulnerability, include:
-k to skip SSL verification for targets with self-signed certs.-j for machine-readable JSON output.-o ./findings to persist results for later reporting.