Skip to content

NeaByteLab/Pentest-Skill

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Pentest Skill Preview

Repo Size Total Files Disclaimer License

Pentest Skill

Tested on Claude Code, Codex and many AI agents

Transform any LLM into an autonomous blackbox penetration testing agent. Structured prompts that guide AI through 7 phases of security assessment from surface enumeration to zero-day hunting.

Disclaimer

Warning

IMPORTANT: These prompts are for authorized security testing only on systems you own or have explicit written permission to test. Unauthorized access to computer systems is illegal under CFAA (US) and similar laws worldwide.

Features

  • Surface Enumeration - Fetch main page, robots.txt, sitemap.xml, and identify technologies
  • Recon & Discovery - Analyze JavaScript bundles, extract API endpoints, map attack surface
  • Auto Hunting - Hunt for prototype pollution, XSS, insecure deserialization, weak CORS
  • Dynamic Check - Test for rate limiting, IDOR, broken access control, exposed files
  • Proof of Concept Development - Build working PoCs for discovered vulnerabilities
  • Zero-Day Hunting - Find novel vulnerabilities through logic flaws and race conditions
  • Exploitation & Impact Assessment - Safe exploitation and impact analysis

Known Issues

Claude Code Permission Restrictions

  • Problem: Claude Code may require interactive approval for network operations, file access, and tool execution during pentesting phases.

  • Fix: Start Claude Code with:

    claude --allow-dangerously-skip-permissions

Codex CLI Sandbox Network Restrictions

  • Problem: Codex CLI may fail with failed in sandbox: curl: (6) Could not resolve host errors even when configured for full access.

  • Fix: Edit ~/.codex/config.toml and add:

    [projects."$HOME"]
    trust_level = "trusted"
    sandbox_mode = "danger-full-access"
    network_access = true

Security Defense

Note

Protect Your Systems: If you have code interpreters or AI agents in your system, learn how to secure them against these types of attacks. See Sandbox-Guide for detailed sandboxing tutorials and defense strategies.

License

This project is licensed under the MIT license. See the LICENSE file for details.