Help us improve
Share bugs, ideas, or general feedback.
How this skill is triggered — by the user, by Claude, or both
Slash command
/pentest:pentestThe summary Claude sees in its skill listing — used to decide when to auto-load this skill
Coordinate penetration testing. Deploy executors, aggregate results, generate reports.
PATT_STANDARD.mdattacks/api-security/graphql/graphql-cheat-sheet.mdattacks/api-security/graphql/graphql-quickstart.mdattacks/api-security/graphql/payloads/injection.mdattacks/api-security/rest-api/api-testing-cheat-sheet.mdattacks/api-security/rest-api/api-testing-comprehensive-guide.mdattacks/api-security/web-llm/web-llm-attacks-cheat-sheet.mdattacks/api-security/web-llm/web-llm-attacks-quickstart.mdattacks/api-security/websockets/websockets-cheat-sheet.mdattacks/api-security/websockets/websockets-quickstart.mdattacks/authentication/auth-bypass/authentication-cheat-sheet.mdattacks/authentication/auth-bypass/authentication-quickstart.mdattacks/authentication/jwt/jwt-cheat-sheet.mdattacks/authentication/jwt/jwt-quickstart.mdattacks/authentication/jwt/jwt_attack_techniques.mdattacks/authentication/jwt/jwt_security_resources.mdattacks/authentication/jwt/portswigger_jwt_labs.mdattacks/authentication/oauth/oauth-cheat-sheet.mdattacks/authentication/oauth/oauth-quickstart.mdattacks/authentication/password-attacks/password-attacks.mdConducts OWASP-based penetration testing: reconnaissance, Top 10 vulnerabilities (access control, injection, misconfig), API security, PoCs, code remediations, reports. For security audits.
Guides scoping penetration tests for apps and infrastructure: define targets, methodologies (black/gray/white box), rules of engagement, and remediation tracking.
Provides checklist for penetration testing: scoping objectives, test types, threats, budget, execution, and remediation. For authorized security assessments.
Share bugs, ideas, or general feedback.
Coordinate penetration testing. Deploy executors, aggregate results, generate reports. Use it when user requests pentesting, security assessment, vulnerability testing, bug bounty hunting.
Phase 1: Initialization
outputs/{engagement-name}/Phase 2: Reconnaissance (Read reference/RECONNAISSANCE_OUTPUT.md to get outputs format)
reconnaissance_report.md file using the defined output formatPhase 3: Planning & Approval (MANDATORY)
outputs/{engagement}/reconnaissance/ and the reports.md filesPhase 4: Vulnerability Testing
Phase 5: Aggregation
Phase 6: Reporting (Read reference/FINAL_REPORT.md - includes DOCX conversion)
report/ and processed/ with subdirectoriesprocessed/: reconnaissance/, findings/, activity/ → processed/processed/intermediate-reports/reference/FINAL_REPORT.md template → processed/intermediate-reports/pentest-final-report.mdreport/Penetration-Test-Report.docx (cover page, TOC, body, appendix section)report/Penetration-Test-Report.pdf, else skip (DOCX is primary deliverable)report/appendix/finding-{id}/report/README.mdls -la outputs/{engagement}/ shows ONLY report/ and processed/processed/ except final deliverables (.docx, .json, README, appendix/)Execution: Delegated to specialized agents (SQL Injection Agent, XSS Agent, SSRF Agent, etc.)
9 categories, 50+ attack types:
See reference/ATTACK_INDEX.md for complete list with agent mappings.
Five asset-specific output formats:
See reference/RECONNAISSANCE_OUTPUT.md for complete format specifications and JSON schemas.
See reference/FINAL_REPORT.md for complete format specifications of the final report.
Complete folder organization (See reference/OUTPUT_STRUCTURE.md for details):
outputs/{engagement-name}/
├── report/ # Complete deliverable package (3 files + appendix)
│ ├── Penetration-Test-Report.docx # Main report (includes Referenced Files section)
│ ├── Penetration-Test-Report.pdf # Optional PDF export
│ ├── pentest-report.json # Machine-readable export
│ └── appendix/ # Referenced evidence only
│ ├── finding-001/
│ ├── finding-002/
│ └── reconnaissance-summary.json
└── processed/ # All working/testing artifacts
├── reconnaissance/ # Phase 2 outputs
│ ├── inventory/
│ ├── analysis/
│ └── reconnaissance_report.md
├── findings/ # Phase 4 raw findings
│ └── {finding-id}/
├── activity/ # NDJSON logs
│ └── {executor-name}.log
├── helpers/ # Testing utilities
├── test-frameworks/ # Testing scripts
└── intermediate-reports/ # Drafts, markdown source, etc.
Critical: report/ = 3 files max + appendix/ subfolder. ALL intermediate files go to processed/.
PTES - 7-phase engagement lifecycle OWASP WSTG - 11 testing categories MITRE ATT&CK - TTP mapping across 14 phases Flaw Hypothesis - Stack analysis → Predict → Test → Generalize → Correlate
/authenticating - Authentication testing workflows/ai-threat-testing - LLM vulnerability testing/domain-assessment - Domain reconnaissance/web-application-mapping - Web app reconnaissance/cve-testing - CVE vulnerability testingreport/ (final deliverables) and processed/ (working files)report/ or processed/ls -la outputs/{engagement}/ - must show ONLY report/ and processed/Each attack category contains a payloads/ subdirectory with curated PATT payloads (<200 lines/file).
attacks/<group>/<category>/payloads/patt-fetcher agent → "<category name>"PATT_STANDARD.md — follow this for future curation sessionspriority: high/medium — ready to fill next session