Pentest Commands
Executes common penetration testing commands (e.g., nmap, dirb) to quickly scan and assess system vulnerabilities for enhanced security analysis.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add pentest-commands npx -- -y @trustedskills/pentest-commands
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"pentest-commands": {
"command": "npx",
"args": [
"-y",
"@trustedskills/pentest-commands"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill enables AI agents to execute standard penetration testing commands directly within a terminal environment. It facilitates the automation of security assessments by allowing agents to run specific tools and scripts for vulnerability scanning, network analysis, and system reconnaissance.
When to use it
- Automating initial reconnaissance phases in authorized red team engagements.
- Executing repetitive security checks across multiple target systems without manual intervention.
- Integrating penetration testing workflows into CI/CD pipelines for continuous security validation.
- Generating detailed logs of command outputs for post-assessment reporting and analysis.
Key capabilities
- Direct execution of standard Linux and Windows penetration testing utilities.
- Real-time interaction with terminal environments to capture command output.
- Support for common security assessment toolchains including Nmap, Metasploit, and Nikto.
- Structured data extraction from command results for further processing by the AI agent.
Example prompts
- "Run a comprehensive port scan on target IP 192.168.1.50 using Nmap and identify open services."
- "Execute a directory listing on the web server at example.com to check for exposed sensitive files."
- "List all running processes on the target machine and filter for any suspicious database services."
Tips & gotchas
Ensure you have explicit, written authorization before using this skill against any system, as unauthorized access is illegal. Always configure the agent with appropriate network access rules and firewall permissions to prevent command execution failures due to connectivity restrictions.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.