pt-post-exploitation

Installation
SKILL.md

Post-Exploitation

Authorized Use Only

Run post-exploitation tasks only after explicit approval for this phase. Keep actions controlled, reversible, and auditable. Avoid destructive changes and unnecessary access to sensitive data.

Objectives

  1. Measure realistic impact after initial access.
  2. Evaluate privilege escalation and lateral movement opportunities.
  3. Identify credential and data exposure paths.
  4. Assess logging, detection, and response effectiveness.

Workflow

  1. Confirm phase boundaries:
    • Allowed techniques, prohibited actions, and stop conditions
    • Approved systems, accounts, and time windows
  2. Stabilize foothold context:
Related skills

More from santosomar/ethical-hacking-agent-skills

Installs
1
GitHub Stars
7
First Seen
Apr 3, 2026