Create Attack Technique
Generate novel attack techniques based on threat intelligence and observed vulnerabilities to proactively strengthen defenses.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add create-attack-technique npx -- -y @trustedskills/create-attack-technique
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"create-attack-technique": {
"command": "npx",
"args": [
"-y",
"@trustedskills/create-attack-technique"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
The create-attack-technique skill allows AI agents to generate detailed attack techniques based on provided inputs. It can produce structured outputs including attacker tactics, procedures, and techniques (TPTs) that are suitable for red team operations or security assessments. The generated techniques include relevant MITRE ATT&CK mappings and considerations for execution.
When to use it
- Red Team Planning: Generate new attack scenarios and TPTs for a planned engagement.
- Security Assessment Preparation: Develop potential attack vectors to test the effectiveness of existing defenses.
- Threat Intelligence Enrichment: Translate threat intelligence reports into actionable attack techniques.
- Training & Simulation: Create realistic attack simulations for security training exercises.
Key capabilities
- Generates detailed attack techniques.
- Includes MITRE ATT&CK mappings.
- Provides considerations for execution.
- Produces structured TPT outputs.
Example prompts
- "Create an attack technique targeting Active Directory using PowerShell."
- "Generate a phishing attack technique leveraging social engineering principles, mapped to ATT&CK ID T1566."
- "Develop a technique for lateral movement within a network after initial access has been achieved."
Tips & gotchas
The quality of the generated techniques depends heavily on the specificity and clarity of the prompt. Providing context about the target environment or desired attacker profile will improve results.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.