Pentest Checklist

🌐Community
by sebas-aikon-intelligence · vlatest · Repository

Generates a comprehensive pentest checklist to ensure thorough security assessments and identify vulnerabilities effectively.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add sebas-aikon-intelligence-pentest-checklist npx -- -y @trustedskills/sebas-aikon-intelligence-pentest-checklist
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "sebas-aikon-intelligence-pentest-checklist": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/sebas-aikon-intelligence-pentest-checklist"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

What it does

This skill provides a comprehensive penetration testing checklist to guide security assessments. It outlines key areas of focus, including reconnaissance, scanning, exploitation, and post-exploitation phases. The checklist aims to ensure thoroughness and identify potential vulnerabilities in target systems or networks.

When to use it

  • Planning a pentest: Use the checklist as a framework for defining scope and objectives.
  • Conducting vulnerability assessments: Employ the list to systematically evaluate security controls.
  • Reviewing existing pentest reports: Compare findings against the checklist to identify any gaps or missed areas.
  • Training junior pentesters: Serve as a guide for new team members learning penetration testing methodologies.

Key capabilities

  • Comprehensive checklist covering multiple phases of penetration testing.
  • Structured approach to security assessments.
  • Guidance on key areas within each phase (reconnaissance, scanning, exploitation, post-exploitation).

Example prompts

  • "Generate a pentest checklist for assessing the security of a web application."
  • "Give me a detailed breakdown of reconnaissance activities in a penetration test."
  • "What are some common vulnerabilities to look for during the exploitation phase?"

Tips & gotchas

This skill assumes a basic understanding of penetration testing concepts. The checklist is intended as a guide and may need to be adapted based on specific engagement requirements.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
sebas-aikon-intelligence
Installs
4

🌐 Community

Passed automated security scans.