This is an automated archive made by the Lemmit Bot.
The original was posted on /r/netsec by /u/stephnot on 2026-03-28 17:56:12+00:00.
I built a set of Claude Code subagents designed for pentesters and red teamers doing authorized engagements.
What it does: You install 6 agent files into Claude Code, and it automatically routes to the right specialist based on what you’re working on. Paste Nmap output and it prioritizes attack vectors with
follow-up commands. Ask about an AD attack and it gives you the methodology AND the detection perspective. Ask it to write a report finding and it formats it to PTES standards with CVSS scoring.
The agents cover:
-
Engagement planning with MITRE ATT&CK mapping
-
Recon/scan output analysis (Nmap, Nessus, BloodHound, etc.)
-
Exploitation methodology with defensive perspective built in
-
Detection rule generation (Sigma, Splunk SPL, Elastic KQL)
-
DISA STIG compliance analysis with keep-open justifications
-
Professional pentest report writing
Every technique references ATT&CK IDs, and the exploit guide agent is required to explain what the attack looks like from the blue team side — so it’s useful for purple team work too.
Repo has example outputs so you can see the quality before installing: https://github.com/0xSteph/pentest-ai/tree/main/examples
Open to feedback. If you think an agent is missing or the methodology is off somewhere, PRs are welcome.
