Skip to content

chainreactors/iom-pentest-skills

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

IoM Pentest Skill

Autonomous penetration testing skill for Claude Code, powered by IoM (Malice Network) C2 framework via MCP tools.

What it does

An OODA-loop driven autonomous pentest skill that covers the full engagement lifecycle:

  • Phase 1: Reconnaissance — OS, privileges, AV/EDR, network, software
  • Phase 2: Privilege Escalation — UAC bypass, Potato, kernel exploits
  • Phase 3: Credential Harvesting — hashdump, mimikatz, kerberoast
  • Phase 4: Lateral Movement — psexec, WMI, DCOM, pass-the-ticket
  • Phase 5: Persistence — registry, services, scheduled tasks

Each phase analyzes results before deciding the next action. Adapts strategy based on target environment, AV/EDR detection, and privilege level.

Prerequisites

  • Claude Code installed
  • IoM server running with MCP enabled
  • Active implant sessions

Install

# Add marketplace
claude plugin marketplace add chainreactors/iom-pentest

# Install skill
claude plugin install iom-pentest@iom-pentest-skills

Usage

/iom-pentest              # Full auto: recon → privesc → creds → lateral → persist
/iom-pentest recon        # Reconnaissance only, no exploitation
/iom-pentest privesc      # Focus on privilege escalation
/iom-pentest lateral      # Focus on lateral movement
/iom-pentest persist      # Establish persistence
/iom-pentest <session_id> # Operate on specific session

Reference Docs

File Content
opsec-guide.md AV/EDR identification and evasion strategies
technique-reference.md Privilege escalation, lateral movement, persistence quick reference

License

MIT

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors