This is an automated archive made by the Lemmit Bot.

The original was posted on /r/netsec by /u/stephnot on 2026-03-28 17:56:12+00:00.


I built a set of Claude Code subagents designed for pentesters and red teamers doing authorized engagements.

What it does: You install 6 agent files into Claude Code, and it automatically routes to the right specialist based on what you’re working on. Paste Nmap output and it prioritizes attack vectors with

follow-up commands. Ask about an AD attack and it gives you the methodology AND the detection perspective. Ask it to write a report finding and it formats it to PTES standards with CVSS scoring.

The agents cover:

  • Engagement planning with MITRE ATT&CK mapping

  • Recon/scan output analysis (Nmap, Nessus, BloodHound, etc.)

  • Exploitation methodology with defensive perspective built in

  • Detection rule generation (Sigma, Splunk SPL, Elastic KQL)

  • DISA STIG compliance analysis with keep-open justifications

  • Professional pentest report writing

Every technique references ATT&CK IDs, and the exploit guide agent is required to explain what the attack looks like from the blue team side — so it’s useful for purple team work too.

Repo has example outputs so you can see the quality before installing: https://github.com/0xSteph/pentest-ai/tree/main/examples

Open to feedback. If you think an agent is missing or the methodology is off somewhere, PRs are welcome.