pt-gaining-access

Installation
SKILL.md

Pen Test Gaining Access

Authorized Use Only

Only perform controlled exploitation on explicitly approved targets. Avoid destructive actions, production instability, and unnecessary data access. Stop immediately if impact exceeds rules of engagement.

Objectives

  1. Validate whether identified weaknesses are exploitable.
  2. Demonstrate business-relevant impact with minimum disruption.
  3. Capture reproducible evidence for remediation.

Workflow

  1. Select candidates:
    • Use only prioritized, in-scope findings from scanning
    • Confirm preconditions and rollback/safety plan
  2. Define proof-of-concept boundaries:
    • Minimal payloads to prove exploitability
Related skills

More from santosomar/ethical-hacking-agent-skills

Installs
1
GitHub Stars
7
First Seen
Apr 3, 2026