Autonomous penetration testing skill for Claude Code, powered by IoM (Malice Network) C2 framework via MCP tools.
An OODA-loop driven autonomous pentest skill that covers the full engagement lifecycle:
- Phase 1: Reconnaissance — OS, privileges, AV/EDR, network, software
- Phase 2: Privilege Escalation — UAC bypass, Potato, kernel exploits
- Phase 3: Credential Harvesting — hashdump, mimikatz, kerberoast
- Phase 4: Lateral Movement — psexec, WMI, DCOM, pass-the-ticket
- Phase 5: Persistence — registry, services, scheduled tasks
Each phase analyzes results before deciding the next action. Adapts strategy based on target environment, AV/EDR detection, and privilege level.
- Claude Code installed
- IoM server running with MCP enabled
- Active implant sessions
# Add marketplace
claude plugin marketplace add chainreactors/iom-pentest
# Install skill
claude plugin install iom-pentest@iom-pentest-skills/iom-pentest # Full auto: recon → privesc → creds → lateral → persist
/iom-pentest recon # Reconnaissance only, no exploitation
/iom-pentest privesc # Focus on privilege escalation
/iom-pentest lateral # Focus on lateral movement
/iom-pentest persist # Establish persistence
/iom-pentest <session_id> # Operate on specific session
| File | Content |
|---|---|
| opsec-guide.md | AV/EDR identification and evasion strategies |
| technique-reference.md | Privilege escalation, lateral movement, persistence quick reference |
MIT