SkillAgentSearch skills...

Communitytools

Open-source Claude Code skills, agents, and slash commands for AI-powered penetration testing, bug bounty hunting, and security research

Install / Use

/learn @transilienceai/Communitytools
About this skill

Quality Score

0/100

Supported Platforms

Claude Code
Claude Desktop

README

Transilience AI Community Security Tools

<div align="center">

MIT License GitHub stars Claude AI

Open-source Claude Code skills and agents for AI-powered penetration testing, bug bounty hunting, AI threat testing, and security reconnaissance

Quick Start | Skills & Agents | Architecture | Contributing | Website

</div>

Announcement

Practice Makes Perfect: Teaching an AI to Hack by Learning from Its Mistakes (March 2026)

We built an autonomous pentesting agent that scores 100% (104/104) on a published CTF benchmark suite — using only structured markdown skill files, no fine-tuning. Starting from a bare 89.4% baseline, we ran a simple loop roughly 15 times: run the benchmarks, find a failure, diagnose the missing technique, write it into a skill file, and run again. The same skills transfer cross-model: Claude Sonnet 4.6 reaches 96.2% and Claude Haiku 4.5 reaches 62.5%. This repository contains the full skill set described in the paper.

Read the paper (PDF)


Overview

Transilience AI Community Tools is a consolidated Claude Code security testing suite — 23 skills, 8 agents, and 2 tool integrations that cover the full penetration testing lifecycle from reconnaissance to reporting.

Why Choose Transilience Community Tools?

  • AI-Powered Automation — Claude orchestrates intelligent security testing workflows
  • Complete OWASP Coverage — 100% OWASP Top 10 + OWASP LLM Top 10
  • Professional Reporting — CVSS 3.1, CWE, MITRE ATT&CK, Transilience-branded PDF reports
  • Playwright Integration — Browser automation for client-side vulnerability testing
  • Payload-Enriched References — 160+ reference files with inline PayloadsAllTheThings techniques
  • Open Source — MIT licensed for commercial and personal use

Quick Start

1. Clone and enter the project

git clone https://github.com/transilienceai/communitytools.git
cd communitytools/projects/pentest

2. Install tools (optional but recommended)

# Browser automation (XSS, CSRF, clickjacking testing)
.claude/tools/playwright/install.sh

# CLI tools (nmap, sqlmap, nikto, gobuster, ffuf, testssl)
.claude/tools/kali/install.sh

# Verify
.claude/tools/check-all.sh

3. Open Claude Code and run skills

claude    # Launch Claude Code from the projects/pentest directory

Then use slash commands inside the Claude session:

/coordination https://target.com     # Full penetration test
/hackthebox                          # HackTheBox challenge automation
/hackerone                           # Bug bounty workflow
/techstack-identification            # Passive tech stack recon
/reconnaissance target.com           # Attack surface mapping
/source-code-scanning ./app          # Static code analysis

Skills & Agents

All skills and agents live under projects/pentest/.claude/.

Agents (8)

| Agent | Role | |-------|------| | Pentester Orchestrator | Coordinates pentests — plans, dispatches parallel agent batches, analyzes results, adapts | | Pentester Executor | Thin experiment runner — executes specific tests, returns raw results | | Pentester Validator | Validates findings against raw evidence — all 5 checks must pass or finding is rejected | | HackTheBox | Platform automation — login, challenge selection, VPN, delegates solving, logs proceedings | | HackerOne Hunter | Bug bounty automation — scope parsing, parallel testing, PoC validation, submission reports | | Script Generator | Generates optimized scripts for pentest agents — parallelization, syntax validation | | PATT Fetcher | On-demand PayloadsAllTheThings retrieval when local payloads are insufficient | | Skiller | Skill creation and management — scaffolding, validation, GitHub workflow |

Skills by Category (23)

Vulnerability Testing (10)

| Skill | Coverage | |-------|----------| | /injection | SQL, NoSQL, OS Command, SSTI, XXE, LDAP/XPath | | /client-side | XSS (Reflected/Stored/DOM), CSRF, Clickjacking, CORS, Prototype Pollution | | /server-side | SSRF, HTTP Smuggling, Path Traversal, File Upload, Deserialization, Host Header | | /authentication | Auth Bypass, JWT, OAuth, Password Attacks, 2FA Bypass, CAPTCHA Bypass | | /api-security | GraphQL, REST API, WebSockets, Web LLM | | /web-app-logic | Business Logic, Race Conditions, Access Control, Cache Poisoning/Deception, IDOR | | /cloud-containers | AWS, Azure, GCP, Docker, Kubernetes | | /system | Active Directory, Privilege Escalation (Linux/Windows), Exploit Development | | /infrastructure | Port Scanning, DNS, MITM, VLAN Hopping, IPv6, SMB/NetBIOS | | /social-engineering | Phishing, Pretexting, Vishing, Physical Security |

Reconnaissance (3)

| Skill | Purpose | |-------|---------| | /reconnaissance | Subdomain discovery, port scanning, endpoint enumeration, API discovery, attack surface mapping | | /osint | Repository enumeration, secret scanning, git history analysis, employee footprint | | /techstack-identification | Passive tech stack inference across 17 intelligence domains |

Specialized (3)

| Skill | Purpose | |-------|---------| | /ai-threat-testing | OWASP LLM Top 10 — prompt injection, model extraction, data poisoning, supply chain | | /cve-poc-generator | CVE research, NVD lookup, safe Python PoC generation, vulnerability reports | | /source-code-scanning | SAST — OWASP Top 10, CWE Top 25, dependency CVEs, hardcoded secrets |

Platform Integrations (2)

| Skill | Purpose | |-------|---------| | /hackerone | Scope CSV parsing, parallel asset testing, PoC validation, platform-ready submissions | | /hackthebox | Playwright-based login, challenge browsing, VPN management, automated solving |

Orchestration & Tooling (5)

| Skill | Purpose | |-------|---------| | /coordination | Engagement orchestration, test planning, output structure | | /essential-tools | Burp Suite, Playwright automation, methodology, reporting standards | | /transilience-report-style | Transilience-branded PDF report generation (ReportLab) | | /github-workflow | Git branching, commits, PRs, issues, code review | | /skiller | Skill scaffolding, validation, GitHub workflow automation |

Tool Integrations (2)

| Tool | Purpose | |------|---------| | Playwright | Browser automation for client-side testing via MCP | | Kali Linux Tools | nmap, masscan, nikto, gobuster, ffuf, sqlmap, testssl, and more |


Architecture

The suite uses a hybrid AGENTS.md + Skills architecture based on Vercel research showing 100% pass rate vs 53-79% for skills alone:

  • AGENTS.md (root) — Passive knowledge base, always loaded. Compressed security payloads, methodologies (PTES, OWASP, MITRE), CVSS scoring, PoC standards.
  • Skills (.claude/skills/) — User-triggered workflows invoked with /skill-name. Multi-step orchestration, parallel agents, checkpointing.
  • Agents (.claude/agents/) — Autonomous workers spawned by skills and orchestrators.

Multi-Agent Execution Flow

sequenceDiagram
    participant User
    participant Skill as Skill Layer
    participant Orch as Orchestrator Agent
    participant Agents as Specialized Agents
    participant Output as Standardized Outputs

    User->>Skill: /pentest https://target.com
    Skill->>Orch: Initialize 7-phase workflow

    Orch->>Agents: Phase 1-2: Deploy recon agents
    Agents-->>Output: inventory/*.json + analysis/*.md

    Orch->>Agents: Phase 3-4: Deploy vuln agents in parallel
    Note over Agents: SQL/XSS/SSRF/JWT/OAuth/SSTI/XXE...
    Agents-->>Output: findings/*.json + evidence/*.png

    Orch->>Output: Phase 5: Generate reports
    Output-->>User: Executive + technical reports

Repository Structure

communitytools/
├── AGENTS.md                    # Passive security knowledge (always loaded)
├── CLAUDE.md                    # Project instructions
├── marketplace.json             # Machine-readable project manifest
├── papers/                      # Research papers
├── benchmarks/                  # XBOW benchmark runner
└── projects/pentest/            # Main project
    └── .claude/
        ├── agents/              # 8 agent definitions
        │   ├── pentester-orchestrator.md
        │   ├── pentester-executor.md
        │   ├── pentester-validator.md
        │   ├── hackthebox.md
        │   ├── hackerone.md
        │   ├── script-generator.md
        │   ├── patt-fetcher.md
        │   ├── skiller.md
        │   └── reference/       # Output structure, test plan format
        ├── skills/              # 23 skill directories
        │   ├── {skill-name}/
        │   │   ├── SKILL.md     # Skill definition
        │   │   └── reference/   # Attack techniques, cheat sheets, payloads
        │   └── ...
        └── tools/               # Tool integrations
            ├── playwright/
            └── kali/

Contributing

We welcome contributions from the security community!

Read the full guide: CONTRIBUTING.md

Quick path using the Skiller:

/skiller
# Select: CREATE → provide details → automated GitHub workflow
# Handles: issue creation, branch, skill generation, validation, commit, PR

Security & Legal

IMPORTANT: These tools are designed for authorized security testing ONLY.

Authorized & Legal Use:

  • Penetration testing with written authorization
View on GitHub
GitHub Stars129
CategoryDevelopment
Updated22h ago
Forks24

Languages

Python

Security Score

100/100

Audited on Apr 3, 2026

No findings