penetration-testing

Ethical hacking and security testing methodologies using penetration testing tools, exploit frameworks, and manual security validation. Use when assessing application security posture and identifying exploitable vulnerabilities.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "penetration-testing" with this command: npx skills add aj-geddes/useful-ai-prompts/aj-geddes-useful-ai-prompts-penetration-testing

Penetration Testing

Table of Contents

Overview

Systematic security testing to identify, exploit, and document vulnerabilities in applications, networks, and infrastructure through simulated attacks.

When to Use

  • Pre-production security validation
  • Annual security assessments
  • Compliance requirements (PCI-DSS, ISO 27001)
  • Post-incident security review
  • Third-party security audits
  • Red team exercises

Quick Start

Minimal working example:

# pentest_framework.py
import requests
import socket
import subprocess
import json
from typing import List, Dict
from dataclasses import dataclass, asdict
from datetime import datetime

@dataclass
class Finding:
    severity: str
    category: str
    target: str
    vulnerability: str
    evidence: str
    remediation: str
    cvss_score: float

class PenetrationTester:
    def __init__(self, target: str):
        self.target = target
        self.findings: List[Finding] = []

    def test_sql_injection(self, url: str) -> None:
// ... (see reference guides for full implementation)

Reference Guides

Detailed implementations in the references/ directory:

GuideContents
Automated Penetration Testing FrameworkAutomated Penetration Testing Framework
Burp Suite Automation ScriptBurp Suite Automation Script

Best Practices

✅ DO

  • Get written authorization
  • Define clear scope
  • Use controlled environments
  • Document all findings
  • Follow responsible disclosure
  • Provide remediation guidance
  • Verify fixes after patching
  • Maintain chain of custody

❌ DON'T

  • Test production without approval
  • Cause service disruption
  • Exfiltrate sensitive data
  • Share findings publicly
  • Exceed authorized scope
  • Use destructive payloads

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

api-security-hardening

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-compliance-audit

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-testing

No summary provided by upstream source.

Repository SourceNeeds Review
Security

web-performance-audit

No summary provided by upstream source.

Repository SourceNeeds Review