pentest-ai - 6 Claude Code subagents for offensive security research (engagement planning, recon analysis, exploit methodology, detection engineering, STIG compliance, report writing)
嗯,用户让我帮忙总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,理解主要信息。 文章讲的是作者开发了一组Claude Code子代理,专为渗透测试和红队人员设计。这些代理帮助自动处理不同的任务,比如分析Nmap输出、生成检测规则、撰写报告等。每个代理都有特定的功能,并且参考了MITRE ATT&CK框架。 接下来,我需要提取关键点:子代理的功能、覆盖的领域、参考框架以及提供示例输出的GitHub仓库。然后,把这些信息浓缩到100字以内,确保语言简洁明了。 可能的结构是先介绍子代理的作用,然后列举主要功能和覆盖的领域,最后提到GitHub资源和反馈开放。这样既全面又符合字数限制。 现在开始组织语言:“作者开发了一组Claude Code子代理,专为渗透测试和红队人员设计。这些子代理能够自动处理任务如分析扫描结果、生成检测规则、撰写报告等,并参考MITRE ATT&CK框架。GitHub仓库提供示例输出供参考。” 这样大约90字左右,符合要求。 检查一下是否有遗漏的重要信息:比如每个技术都引用ATT&CK ID,以及对蓝队视角的解释。不过为了简洁,可能不需要详细说明这些细节。 最后确认语言流畅自然,没有使用复杂的术语或结构。 </think> 作者开发了一组Claude Code子代理,专为渗透测试和红队人员设计。这些子代理能够自动处理任务如分析扫描结果、生成检测规则、撰写报告等,并参考MITRE ATT&CK框架。GitHub仓库提供示例输出供参考。 2026-3-28 17:56:12 Author: www.reddit.com(查看原文) 阅读量:2 收藏

I built a set of Claude Code subagents designed for pentesters and red teamers doing authorized engagements.

What it does: You install 6 agent files into Claude Code, and it automatically routes to the right specialist based on what you're working on. Paste Nmap output and it prioritizes attack vectors with

follow-up commands. Ask about an AD attack and it gives you the methodology AND the detection perspective. Ask it to write a report finding and it formats it to PTES standards with CVSS scoring.

The agents cover:

- Engagement planning with MITRE ATT&CK mapping

- Recon/scan output analysis (Nmap, Nessus, BloodHound, etc.)

- Exploitation methodology with defensive perspective built in

- Detection rule generation (Sigma, Splunk SPL, Elastic KQL)

- DISA STIG compliance analysis with keep-open justifications

- Professional pentest report writing

Every technique references ATT&CK IDs, and the exploit guide agent is required to explain what the attack looks like from the blue team side — so it's useful for purple team work too.

Repo has example outputs so you can see the quality before installing: https://github.com/0xSteph/pentest-ai/tree/main/examples

Open to feedback. If you think an agent is missing or the methodology is off somewhere, PRs are welcome.


文章来源: https://www.reddit.com/r/netsec/comments/1s677pu/pentestai_6_claude_code_subagents_for_offensive/
如有侵权请联系:admin#unsafe.sh