Pentest Checklist
This Pentest Checklist generates a comprehensive security audit plan, streamlining penetration testing and ensuring thorough coverage.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add hainamchung-pentest-checklist npx -- -y @trustedskills/hainamchung-pentest-checklist
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"hainamchung-pentest-checklist": {
"command": "npx",
"args": [
"-y",
"@trustedskills/hainamchung-pentest-checklist"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill provides a comprehensive pentesting checklist to guide security assessments. It covers various stages, from reconnaissance and scanning to exploitation and reporting, ensuring thoroughness in identifying vulnerabilities. The checklist is designed to be adaptable for different environments and attack surfaces.
When to use it
- Performing initial vulnerability scans on web applications or networks.
- Creating a standardized process for penetration testing engagements.
- Auditing existing security practices against industry best practices.
- Training junior cybersecurity professionals in pentesting methodologies.
Key capabilities
- Provides a detailed checklist of pentesting steps.
- Covers reconnaissance, scanning, exploitation, and reporting phases.
- Offers a structured approach to vulnerability assessment.
Example prompts
- "Generate a pentest checklist for a web application."
- "What are the key steps in the reconnaissance phase of a penetration test?"
- "Give me a list of common vulnerabilities to look for during scanning."
Tips & gotchas
This skill assumes a basic understanding of cybersecurity principles. The checklist is intended as a guide and may need customization based on specific target environments.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.