Назад към всички

pentest-c2-operator

// Set up authorized C2 simulation workflows and measure defensive detection outcomes.

$ git log --oneline --stat
stars:1,933
forks:367
updated:March 4, 2026
SKILL.mdreadonly
SKILL.md Frontmatter
namepentest-c2-operator
descriptionSet up authorized C2 simulation workflows and measure defensive detection outcomes.

Pentest C2 Operator

Stage

  • PTES: 5-6
  • MITRE: TA0011

Objective

Track infrastructure, persistence, and alerting outcomes from C2 simulation.

Required Workflow

  1. Validate scope before any active action and reject out-of-scope targets.
  2. Run only authorized checks aligned to PTES, OWASP WSTG, NIST SP 800-115, and MITRE ATT&CK.
  3. Write findings in canonical finding_schema format with reproducible PoC notes.
  4. Honor dry-run mode and require explicit --i-have-authorization for live execution.
  5. Export deterministic artifacts for downstream skill consumption.

Execution

python skills/pentest-c2-operator/scripts/c2_operator.py --scope scope.json --target <target> --input <path> --output <path> --format json --dry-run

Outputs

  • c2-infrastructure.json
  • persistence-mechanisms.json
  • c2-report.json

References

  • references/tools.md
  • skills/autonomous-pentester/shared/scope_schema.json
  • skills/autonomous-pentester/shared/finding_schema.json

Legal and Ethical Notice

WARNING AUTHORIZED USE ONLY
This skill executes real security testing tools against live targets.
Use only with written authorization.