Skip to content

transilienceai/communitytools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

36 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Transilience AI Community Security Tools

MIT License PRs Welcome GitHub issues GitHub stars Claude AI

Open-source Claude Code skills, agents, and slash commands for AI-powered penetration testing, bug bounty hunting, and security research

πŸš€ Quick Start β€’ πŸ“– Documentation β€’ 🀝 Contributing β€’ 🌐 Website


πŸ“‹ Table of Contents


🎯 Overview

Transilience AI Community Tools is a comprehensive collection of Claude Code skills, agents, and slash commands for security testing, penetration testing, and bug bounty hunting. This repository provides AI-powered security workflows that run directly in Claude Code, enabling automated vulnerability testing, reconnaissance, and professional security reporting.

What's Inside?

This repository provides a complete Claude Code security testing framework:

  • 🎯 7 Security Testing Skills - Pentest, HackerOne, CVE testing, domain assessment, web app mapping
  • πŸ€– 35+ Specialized Agents - SQL injection, XSS, SSRF, JWT, OAuth, SSTI, XXE, and more
  • πŸ”§ 6 Orchestration Agents - Multi-phase coordinators (Pentester, HackerOne Hunter, Git workflows)
  • πŸ“ 14 Slash Commands - /pentest, /hackerone, /commit, /pr, /issue, /branch, /skiller
  • πŸ“š 264+ Lab Walkthroughs - PortSwigger Academy solutions with step-by-step guides
  • πŸ“Š Standardized Outputs - Professional reports with CVSS scoring and evidence

Why Choose Transilience Community Tools?

  • πŸ€– AI-Powered Automation - Claude AI orchestrates intelligent security testing workflows
  • 🎯 35+ Specialized Agents - Parallel vulnerability testing across all OWASP categories
  • πŸ” Complete OWASP Coverage - 100% OWASP Top 10 + SANS Top 25 CWE testing
  • πŸ“Š Professional Reporting - CVSS 3.1, CWE, MITRE ATT&CK, remediation guidance
  • πŸ”¬ Playwright Integration - Browser automation for client-side vulnerability testing
  • πŸŽ“ Educational Resources - 264+ lab walkthroughs, 46+ attack type documentation
  • πŸ“š Claude Code Native - Works seamlessly in Claude Code IDE with slash commands
  • βš–οΈ Open Source - MIT licensed for commercial and personal use

πŸ—οΈ Architecture

Claude Code Skills & Agents Framework

This repository provides Claude Code skills, specialized agents, and slash commands for security testing workflows.

graph TB
    subgraph "User Interface"
        A[Security Researcher<br/>Penetration Tester<br/>Bug Bounty Hunter]
    end

    subgraph "Claude Code IDE"
        B[Slash Commands<br/>/pentest /hackerone /commit]
    end

    subgraph "Skills Layer .claude/skills/"
        C1[Pentest Skill]
        C2[HackerOne Skill]
        C3[CVE Testing]
        C4[Domain Assessment]
        C5[Web App Mapping]
        C6[Common AppSec]
        C7[Authenticating]
    end

    subgraph "Orchestration Agents .claude/agents/"
        D1[Pentester Agent<br/>Multi-phase coordinator]
        D2[HackerOne Hunter<br/>Bug bounty workflow]
        D3[Git Workflow Agents<br/>Issue/PR/Branch]
        D4[Skiller Agent<br/>Skill creation]
    end

    subgraph "Specialized Agents .claude/agents/specialized/"
        E1[SQL Injection]
        E2[XSS Testing]
        E3[SSRF Detection]
        E4[JWT Attack]
        E5[OAuth Testing]
        E6[SSTI Detection]
        E7[XXE Testing]
        E8[35+ More Agents]
    end

    subgraph "Tools & Automation"
        F1[Playwright MCP<br/>Browser automation]
        F2[HTTP Testing<br/>curl/httpx/requests]
        F3[Evidence Capture<br/>Screenshots/Videos]
    end

    subgraph "Standardized Outputs .claude/output-standards/"
        G1[Reconnaissance<br/>inventory/ + analysis/]
        G2[Vulnerability Testing<br/>findings/ + evidence/]
        G3[Bug Bounty<br/>Platform submissions]
    end

    A --> B
    B --> C1 & C2 & C3 & C4 & C5 & C6 & C7
    C1 --> D1
    C2 --> D2
    C3 & C4 & C5 & C6 --> D1
    D1 & D2 --> E1 & E2 & E3 & E4 & E5 & E6 & E7 & E8
    E1 & E2 & E3 & E4 & E5 & E6 & E7 & E8 --> F1 & F2 & F3
    F1 & F2 & F3 --> G1 & G2 & G3

    style B fill:#4CAF50,color:#fff
    style D1 fill:#2196F3,color:#fff
    style G2 fill:#9C27B0,color:#fff
Loading

Repository Structure

communitytools/
β”œβ”€β”€ .claude/
β”‚   β”œβ”€β”€ skills/              # Security testing skills
β”‚   β”‚   β”œβ”€β”€ pentest/         # 46+ attack types, 264+ lab walkthroughs
β”‚   β”‚   β”œβ”€β”€ hackerone/       # Bug bounty hunting automation
β”‚   β”‚   β”œβ”€β”€ cve-testing/     # CVE vulnerability testing
β”‚   β”‚   β”œβ”€β”€ domain-assessment/     # Subdomain discovery, port scanning
β”‚   β”‚   β”œβ”€β”€ web-application-mapping/ # Endpoint discovery, tech detection
β”‚   β”‚   β”œβ”€β”€ common-appsec-patterns/ # OWASP Top 10 testing
β”‚   β”‚   └── authenticating/  # Auth testing, 2FA bypass, bot evasion
β”‚   β”‚
β”‚   β”œβ”€β”€ agents/              # Orchestration agents
β”‚   β”‚   β”œβ”€β”€ pentester.md     # Multi-phase pentest coordinator
β”‚   β”‚   β”œβ”€β”€ hackerone-hunter.md # Bug bounty workflow orchestrator
β”‚   β”‚   β”œβ”€β”€ skiller.md       # Skill creation/management
β”‚   β”‚   β”œβ”€β”€ git-*.md         # Git workflow automation
β”‚   β”‚   └── specialized/     # 35+ vulnerability-specific agents
β”‚   β”‚       β”œβ”€β”€ sql-injection-agent.md
β”‚   β”‚       β”œβ”€β”€ xss-agent.md
β”‚   β”‚       β”œβ”€β”€ ssrf-agent.md
β”‚   β”‚       β”œβ”€β”€ jwt-agent.md
β”‚   β”‚       └── ... (31 more)
β”‚   β”‚
β”‚   β”œβ”€β”€ commands/            # Slash commands
β”‚   β”‚   β”œβ”€β”€ pentest.md       # /pentest command
β”‚   β”‚   β”œβ”€β”€ hackerone.md     # /hackerone command
β”‚   β”‚   β”œβ”€β”€ commit.md        # /commit workflow
β”‚   β”‚   └── ... (11 total)
β”‚   β”‚
β”‚   └── output-standards/    # Standardized output formats
β”‚       β”œβ”€β”€ OUTPUT_STANDARDS.md
β”‚       └── reference/
β”‚
β”œβ”€β”€ outputs/                 # Generated findings and reports
β”œβ”€β”€ CLAUDE.md               # Repository-wide instructions
β”œβ”€β”€ CONTRIBUTING.md         # Contribution guidelines
└── README.md              # This file

Multi-Agent Execution Flow

sequenceDiagram
    participant User
    participant Skill as Pentest Skill
    participant Orch as Pentester Agent
    participant Agents as Specialized Agents
    participant Tools as Playwright/HTTP
    participant Output as Standardized Outputs

    User->>Skill: /pentest https://target.com
    Skill->>Orch: Initialize 7-phase workflow

    Orch->>Agents: Phase 1-2: Deploy recon agents
    Agents->>Tools: Domain assessment, port scanning
    Tools-->>Output: inventory/*.json + analysis/*.md

    Orch->>Agents: Phase 3-4: Deploy 35+ vuln agents in parallel
    Agents->>Tools: SQL/XSS/SSRF/JWT/OAuth testing
    Tools-->>Output: findings/*.json + evidence/*.png

    Orch->>Output: Phase 5: Generate reports
    Output-->>User: Executive + technical reports

    Note over Agents,Tools: Specialized agents:<br/>SQL, NoSQL, XSS, SSRF,<br/>JWT, OAuth, SSTI, XXE,<br/>+ 27 more types
Loading

πŸ’‘ Use Cases

1. Penetration Testing

Execute comprehensive security assessments using the /pentest command:

# In Claude Code
/pentest

# Deploys 35+ specialized agents to test for:
# - Injection flaws (SQL, NoSQL, Command, SSTI, XXE)
# - Authentication/authorization bypass
# - Client-side attacks (XSS, CSRF, Clickjacking)
# - Server-side vulnerabilities (SSRF, file upload, path traversal)
# - API security issues (GraphQL, REST, JWT, OAuth)
# - Business logic flaws and race conditions

Output: Professional pentest reports with CVSS scores, remediation guidance, and evidence.

2. Bug Bounty Hunting

Automate bug bounty workflows with the /hackerone command:

# In Claude Code
/hackerone

# Workflow:
# 1. Parse program scope from CSV/text
# 2. Deploy parallel testing across all in-scope assets
# 3. Validate proof-of-concept for each finding
# 4. Generate platform-ready submission reports
# 5. Auto-categorize severity and impact

Output: HackerOne/Bugcrowd-formatted submissions with PoC, impact analysis, and reproduction steps.

3. CVE Testing & Research

Test applications for known CVEs:

# In Claude Code
# Example: Test for specific CVE
"Test this application for CVE-2023-XXXX"

# The cve-testing skill:
# 1. Identifies technology stack
# 2. Researches applicable CVEs
# 3. Deploys exploitation attempts
# 4. Validates with proof-of-concept
# 5. Documents findings

Output: CVE validation reports with exploit status and remediation steps.

4. Web Application Security Assessment

Comprehensive web app security testing:

# Phase 1: Reconnaissance
/domain-assessment     # Subdomain discovery, port scanning
/web-application-mapping  # Endpoint discovery, tech detection

# Phase 2: Vulnerability Testing
/common-appsec-patterns  # OWASP Top 10 testing
/authenticating         # Authentication testing, 2FA bypass

# Phase 3: Full Pentest
/pentest              # Complete security assessment

Output: Multi-phase reports with attack surface inventory β†’ vulnerability findings β†’ remediation roadmap.


πŸ› οΈ Available Skills & Commands

Security Testing Skills

/pentest - Comprehensive Penetration Testing

46+ attack types, 264+ PortSwigger lab walkthroughs, 35+ specialized agents

Orchestrates a complete 7-phase penetration test using specialized vulnerability agents:

Vulnerability Coverage:

  • Injection: SQL, NoSQL, Command, SSTI, XXE, LDAP/XPath
  • Client-Side: XSS (Reflected/Stored/DOM), CSRF, Clickjacking, CORS, Prototype Pollution
  • Server-Side: SSRF, HTTP Smuggling, File Upload, Path Traversal, Deserialization
  • Authentication: Auth Bypass, JWT, OAuth, Password Attacks, Session Fixation
  • API Security: GraphQL, REST API, WebSockets, Web LLM
  • Business Logic: Logic Flaws, Race Conditions, Access Control, Cache Poisoning/Deception
  • Web Apps: IDOR, Host Header Injection, Information Disclosure

Features:

  • πŸ€– 35+ Specialized Agents deployed in parallel
  • πŸ“š 264+ Lab Walkthroughs from PortSwigger Academy
  • 🎯 OWASP Top 10 complete coverage
  • πŸ”¬ Playwright Automation for browser-based testing
  • πŸ“Š Professional Reports with CVSS 3.1 scoring
  • 🎨 Evidence Capture (screenshots, videos, HTTP logs)

/hackerone - Bug Bounty Hunting Automation

Automated bug bounty workflow from scope parsing to submission

  • Parse program scope (CSV/text/wildcards)
  • Parallel testing across all in-scope assets
  • Automated PoC validation
  • Platform-ready submission reports (HackerOne, Bugcrowd)
  • CVSS scoring and impact analysis

/domain-assessment - Reconnaissance & Attack Surface Mapping

  • Subdomain discovery (multiple sources)
  • Port scanning and service detection
  • Technology stack identification
  • Attack surface inventory
  • Testing checklist generation

/web-application-mapping - Web App Discovery

  • Passive browsing and spidering
  • Active endpoint discovery
  • Technology detection
  • Headless browser automation
  • Comprehensive application mapping

/cve-testing - CVE Vulnerability Testing

  • Technology stack identification
  • CVE research and matching
  • Automated exploitation attempts
  • PoC validation
  • Vulnerability documentation

/common-appsec-patterns - OWASP Top 10 Testing

Quick-hit testing for common web application vulnerabilities:

  • XSS, SQL injection, SSRF patterns
  • Authentication/authorization flaws
  • Security misconfigurations
  • Client-side security issues

/authenticating - Authentication Security Testing

  • Signup/login workflow testing
  • 2FA/MFA bypass techniques
  • CAPTCHA solving
  • Bot detection evasion
  • Behavioral biometrics simulation
  • OTP handling

Workflow Automation Commands

/commit - Git Commit Automation

Auto-generate conventional commit messages and create commits

/pr - Pull Request Creation

Create PRs with auto-generated descriptions linking to issues

/issue - GitHub Issue Creation

Generate well-formatted GitHub issues with templates

/branch - Git Branch Management

Create branches following conventional naming patterns

/skiller - Skill Development Assistant

Create, update, or remove Claude Code skills with GitHub workflow integration


πŸ”§ Creating Custom Skills

Use the /skiller command to create your own security testing skills:

# In Claude Code
/skiller

# Interactive workflow:
# 1. Choose: CREATE, UPDATE, or REMOVE
# 2. Provide skill details (name, description, agents)
# 3. Select GitHub workflow (optional)
# 4. Auto-generates: structure, documentation, validation
# 5. Creates: issue, branch, commit, PR

Skill Structure:

.claude/skills/your-skill/
β”œβ”€β”€ skill.md           # Skill definition
β”œβ”€β”€ CLAUDE.md          # Context for Claude
β”œβ”€β”€ README.md          # User documentation
└── agents/            # Specialized agents (optional)

πŸš€ Quick Start

Prerequisites

  • Claude Code - AI-powered IDE by Anthropic (Install Claude Code)
  • Git - For cloning the repository
  • Written Authorization - Always get permission before testing any systems

Installation

Step 1: Clone the Repository

git clone https://github.com/transilienceai/communitytools.git
cd communitytools

Step 2: Open in Claude Code

# Open the repository in Claude Code
claude-code .

# Or open Claude Code and use: File β†’ Open Folder β†’ Select communitytools/

Step 3: Skills Auto-Load

Claude Code automatically discovers skills in .claude/skills/ and commands in .claude/commands/. No additional configuration needed!

Usage Examples

Run a Penetration Test:

# In Claude Code chat:
/pentest

# Or provide specific instructions:
"Run a comprehensive pentest on https://testsite.com (I have written authorization)"

Bug Bounty Hunting:

# In Claude Code chat:
/hackerone

# Then provide program details or scope file:
"Here's the HackerOne program scope: [paste CSV/text]"

Reconnaissance:

/domain-assessment
# Discovers subdomains, ports, services, technologies

/web-application-mapping
# Maps endpoints, parameters, application structure

Quick Vulnerability Testing:

/common-appsec-patterns
# Tests for OWASP Top 10 vulnerabilities

/authenticating
# Tests authentication, 2FA, CAPTCHA, bot detection

Development Workflow:

/skiller              # Create/update skills
/issue               # Create GitHub issues
/branch              # Create feature branches
/commit              # Auto-generate commit messages
/pr                  # Create pull requests

First-Time User Tutorial

# 1. Open Claude Code and load this repository
claude-code /path/to/communitytools

# 2. In the Claude Code chat, try:
/pentest

# 3. Claude will ask for:
#    - Target URL/application
#    - Authorization confirmation
#    - Testing scope (subdomains, specific paths, etc.)
#    - Authentication credentials (if needed)

# 4. The pentester agent will:
#    - Deploy 35+ specialized vulnerability agents
#    - Test in parallel across all vulnerability categories
#    - Generate findings in outputs/ directory
#    - Create professional reports with evidence

# 5. Review outputs:
#    outputs/pentest/<target>/
#    β”œβ”€β”€ findings/       # JSON + markdown vulnerability reports
#    β”œβ”€β”€ evidence/       # Screenshots, videos, HTTP logs
#    └── reports/        # Executive + technical reports

πŸ”„ How It Works

Skill β†’ Agent β†’ Tool Execution Model

This repository implements a three-layer architecture:

  1. Skills Layer (.claude/skills/) - User-facing workflows invoked via slash commands
  2. Agents Layer (.claude/agents/) - Orchestrators and specialized testing agents
  3. Tools Layer - Playwright MCP, HTTP clients, evidence capture
flowchart TB
    subgraph "1️⃣ User Invokes Skill"
        A["/pentest<br/>/hackerone<br/>/domain-assessment"]
    end

    subgraph "2️⃣ Skill Loads Context"
        B1[Load SKILL.md]
        B2[Load CLAUDE.md]
        B3[Define methodology]
    end

    subgraph "3️⃣ Deploy Orchestrator Agent"
        C1[Pentester Agent]
        C2[HackerOne Hunter]
        C3[Domain Assessor]
    end

    subgraph "4️⃣ Spawn Specialized Agents in Parallel"
        D1[SQL Injection Agent]
        D2[XSS Agent]
        D3[SSRF Agent]
        D4[JWT Agent]
        D5[35+ More Agents]
    end

    subgraph "5️⃣ Execute Tests with Tools"
        E1[Playwright<br/>Browser automation]
        E2[HTTP Testing<br/>curl/httpx/requests]
        E3[Evidence Capture<br/>Screenshots/Videos]
    end

    subgraph "6️⃣ Generate Standardized Outputs"
        F1[findings/<br/>JSON + markdown]
        F2[evidence/<br/>Screenshots/videos]
        F3[reports/<br/>Executive/technical]
    end

    A --> B1 & B2 & B3
    B1 & B2 & B3 --> C1 & C2 & C3
    C1 & C2 & C3 --> D1 & D2 & D3 & D4 & D5
    D1 & D2 & D3 & D4 & D5 --> E1 & E2 & E3
    E1 & E2 & E3 --> F1 & F2 & F3

    style A fill:#4CAF50,color:#fff
    style C1 fill:#2196F3,color:#fff
    style F3 fill:#9C27B0,color:#fff
Loading

Example: Pentest Workflow

User: /pentest (in Claude Code)

Step 1: Skill Loads

  • Reads .claude/skills/pentest/skill.md for methodology
  • Loads .claude/skills/pentest/CLAUDE.md for context
  • Identifies 46+ attack types and 264+ lab walkthroughs

Step 2: Pentester Agent Deploys

  • Reads .claude/agents/pentester.md for orchestration logic
  • Implements 7-phase PTES methodology
  • Coordinates parallel agent deployment

Step 3: Specialized Agents Execute

Pentester Agent spawns in parallel:
β”œβ”€ SQL Injection Agent (.claude/agents/specialized/sql-injection-agent.md)
β”œβ”€ XSS Agent (.claude/agents/specialized/xss-agent.md)
β”œβ”€ SSRF Agent (.claude/agents/specialized/ssrf-agent.md)
β”œβ”€ JWT Agent (.claude/agents/specialized/jwt-agent.md)
β”œβ”€ OAuth Agent (.claude/agents/specialized/oauth-agent.md)
└─ 30+ more agents...

Step 4: Tools Execute Tests

  • Playwright MCP: Browser-based testing (XSS, CSRF, Clickjacking, Auth)
  • HTTP Testing: Server-side vulnerabilities (SQL, SSRF, XXE, File Upload)
  • Evidence Capture: Screenshots at each test step, HTTP request/response logs

Step 5: Outputs Generated

outputs/pentest/<target>/
β”œβ”€β”€ findings/
β”‚   β”œβ”€β”€ findings.json         # Machine-readable (CVSS, CWE, OWASP)
β”‚   β”œβ”€β”€ finding-001.md        # SQL injection in login
β”‚   β”œβ”€β”€ finding-002.md        # Stored XSS in comments
β”‚   └── finding-003.md        # JWT signature bypass
β”œβ”€β”€ evidence/
β”‚   β”œβ”€β”€ screenshots/          # Visual proof
β”‚   β”œβ”€β”€ videos/               # Exploitation recordings
β”‚   └── http-logs/            # Request/response captures
β”œβ”€β”€ reports/
β”‚   β”œβ”€β”€ executive-summary.md  # Business impact
β”‚   └── technical-report.md   # Complete findings
└── metadata.json             # Testing details

Standardized Output Formats

All skills follow OUTPUT_STANDARDS.md (.claude/output-standards/):

Output Type Directory Structure Use Case
Reconnaissance inventory/ + analysis/ Domain assessment, web app mapping
Vulnerability Testing findings/ + evidence/ + reports/ Pentest, CVE testing, AppSec patterns
Bug Bounty Platform-ready submissions HackerOne, Bugcrowd formatted

Key Features:

  • βœ… CVSS 3.1 scoring
  • βœ… CWE mapping
  • βœ… OWASP Top 10 categorization
  • βœ… MITRE ATT&CK TTPs
  • βœ… Remediation guidance
  • βœ… Evidence-based validation

🀝 Contributing

We welcome contributions from the security community! Whether you're fixing a bug, improving documentation, or adding new security testing capabilities, your help makes these tools better for everyone.

Ways to Contribute

πŸ› Report Issues

  • Bug reports
  • False positives
  • Feature requests
  • Documentation improvements

πŸ’» Contribute Code

  • Fix bugs
  • Add new agents
  • Improve detection
  • Optimize performance

πŸ“š Improve Docs

  • Write tutorials
  • Add examples
  • Fix typos
  • Create guides

Contribution Workflow

Automated Workflow (Recommended):

# Use the /skiller command for automated contribution workflow
/skiller

# Interactive prompts will:
# 1. Create GitHub issue
# 2. Create feature branch (via git-branch-manager agent)
# 3. Generate skill structure and documentation
# 4. Create commit with conventional format (via git-issue-creator)
# 5. Create pull request linking to issue (via git-pr-creator)

Manual Workflow:

flowchart TD
    A[Fork Repository] --> B[Create Issue<br/>/issue or gh issue create]
    B --> C[Create Branch<br/>/branch feature/skill-name]
    C --> D[Develop Skill<br/>Add agents, docs, tests]
    D --> E[Test in Claude Code<br/>Invoke skill, validate outputs]
    E --> F{Tests Pass?}
    F -->|No| D
    F -->|Yes| G[Create Commit<br/>/commit]
    G --> H[Push to Fork]
    H --> I[Create PR<br/>/pr with issue link]
    I --> J{Code Review}
    J -->|Changes Requested| D
    J -->|Approved| K[Merged! πŸŽ‰]

    style K fill:#4CAF50,color:#fff
    style C fill:#2196F3,color:#fff
    style G fill:#FF9800,color:#fff
Loading

Git Workflow Agents:

  • /issue - Creates well-formatted GitHub issues
  • /branch - Creates conventional branches (feature/, bugfix/, docs/)
  • /commit - Auto-generates conventional commit messages
  • /pr - Creates PRs with auto-generated descriptions linking to issues

Read the full guide: CONTRIBUTING.md

Good First Issues

New to contributing? Check out our Good First Issues to get started!


⚠️ Security & Legal

Legal Notice

⚠️ IMPORTANT: These tools are designed for authorized security testing ONLY.

flowchart TB
    A{Do you have written authorization?}
    A -->|Yes| B[βœ… Legal Use]
    A -->|No| C[❌ ILLEGAL - DO NOT USE]
    
    B --> D[Authorized Pentesting]
    B --> E[Bug Bounty Programs]
    B --> F[Security Research]
    B --> G[CTF Competitions]
    B --> H[Your Own Systems]
    
    C --> I[Unauthorized Access = CRIME]
    C --> J[Legal Consequences]
    C --> K[Criminal Prosecution]
    
    style B fill:#4CAF50,color:#fff
    style C fill:#F44336,color:#fff
    style I fill:#F44336,color:#fff
    style J fill:#F44336,color:#fff
    style K fill:#F44336,color:#fff
Loading

Ethical Use Guidelines

βœ… Authorized & Legal Use:

  • Penetration testing with written authorization
  • Bug bounty programs within scope
  • Security research on your own systems
  • CTF competitions and training environments
  • Educational purposes with proper permissions

❌ Prohibited & Illegal Use:

  • Unauthorized testing of any systems
  • Malicious exploitation of vulnerabilities
  • Data theft or system disruption
  • Testing without explicit written permission
  • Any use that violates local or international laws

Users are solely responsible for compliance with all applicable laws and regulations.

Responsible Disclosure

If you discover a vulnerability using these tools:

  1. Do not exploit beyond proof-of-concept
  2. Report immediately to the vendor/organization
  3. Follow responsible disclosure timelines (typically 90 days)
  4. Document thoroughly for remediation
  5. Share knowledge after resolution (if permitted)

🌐 About Transilience AI

Transilience AI is a leading AI-powered security company specializing in:

  • πŸ€– Autonomous Security Testing - AI-driven penetration testing and vulnerability assessment
  • πŸ” Threat Intelligence - Real-time threat detection and analysis
  • πŸ›‘οΈ AI Security Operations - Intelligent incident response and security automation
  • πŸ” Compliance Management - Automated compliance monitoring and reporting
  • 🎯 Vulnerability Research - Zero-day discovery and security research

We believe in giving back to the security community by open-sourcing our tools and frameworks.


πŸ“ž Community & Support

Get Help

  • πŸ’¬ GitHub Discussions - Ask questions, share ideas
  • πŸ› GitHub Issues - Report bugs, request features
  • 🌐 Website - Company information and commercial products
  • πŸ“§ Email - Direct support for enterprise users

Stay Updated

  • ⭐ Star this repository to get updates
  • πŸ‘€ Watch releases for new versions
  • 🐦 Follow us on social media for news and updates
  • πŸ“° Read our blog for security insights

πŸ—ΊοΈ Roadmap

Current Status

Released Skills:

  • βœ… Pentest Skill - 46+ attack types, 264+ lab walkthroughs, 35+ specialized agents
  • βœ… HackerOne Skill - Bug bounty automation from scope parsing to submission
  • βœ… CVE Testing - Vulnerability testing and exploitation framework
  • βœ… Domain Assessment - Subdomain discovery and port scanning
  • βœ… Web App Mapping - Endpoint discovery and technology detection
  • βœ… Common AppSec Patterns - OWASP Top 10 testing
  • βœ… Authenticating - Auth testing, 2FA bypass, bot evasion
  • βœ… Git Workflow Agents - Issue, branch, commit, PR automation
  • βœ… Skiller Agent - Skill creation and management

Planned Enhancements

Q1 2026

  • Enhanced CVE Database Integration - Automated CVE-to-test mapping
  • Burp Suite Integration Skill - Export/import findings from Burp
  • Nuclei Template Skill - Convert Nuclei templates to agent workflows
  • OWASP ZAP Integration - ZAP API integration for automation

Q2 2026

  • Cloud Security Skills - AWS, Azure, GCP misconfigurations
  • Container Security Skill - Docker and Kubernetes testing
  • Mobile Security Skill - iOS and Android app testing
  • API Security Enhancement - gRPC, WebSocket advanced testing

Q3 2026

  • Compliance Reporting - PCI-DSS, SOC 2, ISO 27001 report generation
  • AI/ML Security Skill - LLM prompt injection, model poisoning
  • Blockchain Security - Smart contract auditing agents
  • IoT Security Skill - Firmware and embedded device testing

Community Contributions Welcome:

  • 🎯 New specialized vulnerability agents
  • πŸ“ Additional lab walkthroughs and tutorials
  • πŸ”§ Tool integrations (Metasploit, Nmap, etc.)
  • 🌐 Bug bounty platform integrations (Bugcrowd, Intigriti, YesWeHack)
  • πŸ“Š Enhanced reporting templates

Vote on features: Feature Requests


πŸ“Š Project Stats

Repository Metrics:

Category Count Description
🎯 Security Skills 7 Main security testing workflows
πŸ€– Specialized Agents 35+ Vulnerability-specific testing agents
πŸ”§ Orchestration Agents 6 Workflow coordinators (pentest, hackerone, git)
πŸ“ Slash Commands 14 User-invocable commands
πŸ“š Lab Walkthroughs 264+ PortSwigger Academy solutions
πŸŽ“ Attack Types 46+ Documented exploitation techniques
πŸ“Š Output Standards 3 Standardized formats (recon, vuln, bounty)

Vulnerability Coverage:

  • βœ… OWASP Top 10 (2021) - 100% coverage
  • βœ… SANS Top 25 CWE - 90%+ coverage
  • βœ… MITRE ATT&CK TTPs - Mapped for all findings
  • βœ… CVSS 3.1 Scoring - All vulnerability findings

πŸ™ Acknowledgments

These tools are made possible by:

  • 🌟 The amazing global security research community
  • πŸ› οΈ Open-source security tool developers and maintainers
  • πŸ€– Claude AI by Anthropic for powering our AI capabilities
  • πŸ’Ό Our customers and partners who provide invaluable feedback
  • πŸ‘₯ Contributors who make these tools better every day

Special Thanks

We'd like to give special recognition to:

  • OWASP Foundation for security standards
  • Bug bounty platforms (HackerOne, Bugcrowd, Synack)
  • Security researchers who responsibly disclose vulnerabilities
  • The open-source community for their continuous support

πŸ“ License

All tools in this repository are licensed under the MIT License unless otherwise specified. See LICENSE file for details.

MIT License - Copyright (c) 2025 Transilience AI

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is furnished
to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

What this means:

  • βœ… Commercial use allowed
  • βœ… Modification allowed
  • βœ… Distribution allowed
  • βœ… Private use allowed
  • ⚠️ No warranty provided
  • ⚠️ No liability accepted

πŸ† Contributors

This project exists thanks to all the people who contribute!

Want to see your name here? Check out our Contributing Guide!


πŸ“ˆ GitHub Repository Stats

GitHub last commit GitHub commit activity GitHub contributors GitHub repo size


🌟 Support This Project

If you find these tools useful, please consider:

Star this repository Share on Twitter Follow on LinkedIn


Built with ❀️ by Transilience AI

⭐ Star this repo to support open-source security tools! ⭐

Website β€’ Tools β€’ Report Issue β€’ Discussions


πŸ”– Keywords for Discoverability

claude-code claude-ai ai-security penetration-testing security-testing bug-bounty owasp vulnerability-scanner pentesting-tools security-automation ethical-hacking cybersecurity infosec appsec web-security api-security security-research vulnerability-assessment security-tools open-source-security devsecops playwright-automation hackerone bugcrowd portswigger bscp oscp multi-agent ai-agents

About

Open-source Claude Code skills, agents, and slash commands for AI-powered penetration testing, bug bounty hunting, and security research

Topics

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors