pentest-network-internal
SKILL.md
Pentest Network Internal
Purpose
Simulate an internal attacker to identify weak credentials, misconfigured services, and Active Directory paths to high-value assets.
Core Workflow
- Network Discovery: Map the internal network, live hosts, and open ports using
nmapandmasscan. - Service Enumeration: Identify running services, versions, and potential entry points (SMB, RDP, SSH, etc.).
- Vulnerability Scanning: Check for known service vulnerabilities (e.g., EternalBlue, ZeroLogon) using
nucleiandnmap-scripts. - Credential Auditing: Test weak passwords and default credentials using
hydraandnetexec(CrackMapExec). - Active Directory Enum: Map AD trust relationships, users, and groups using
bloodhoundandldapdomaindump. - Lateral Movement: Simulate movement between hosts using valid credentials or exploits.
References
references/tools.mdreferences/workflows.md
Weekly Installs
25
Repository
jd-opensource/joysafeterGitHub Stars
182
First Seen
Feb 18, 2026
Security Audits
Installed on
github-copilot25
codex25
kimi-cli25
gemini-cli25
amp25
cursor25