CtrlK
BlogDocsLog inGet started
Tessl Logo

pt-post-exploitation

Performs authorized post-exploitation activities to assess impact, lateral movement paths, credential exposure, and detection gaps after initial compromise. Use when a foothold has been validated and the test requires controlled impact expansion analysis.

90

1.63x
Quality

85%

Does it follow best practices?

Impact

100%

1.63x

Average score across 3 eval scenarios

SecuritybySnyk

Advisory

Suggest reviewing before use

SKILL.md
Quality
Evals
Security

Evaluation results

100%

72%

Formalize Post-Exploitation Findings into a Report

Post-exploitation report template structure

Criteria
Without context
With context

Top-level heading

0%

100%

Initial Context section

0%

100%

Entry point field

0%

100%

Starting privilege field

0%

100%

Scope constraints field

0%

100%

Escalation section

0%

100%

Escalation sub-fields

0%

100%

Credential exposure section

0%

100%

Detection section

60%

100%

Cleanup section

100%

100%

Privileges documented

0%

100%

Reachable assets noted

0%

100%

Findings map to business impact

100%

100%

Actions within approved scope

100%

100%

100%

12%

Document a Post-Exploitation Engagement for Compliance Review

Phase boundary and defense visibility documentation

Criteria
Without context
With context

Allowed techniques listed

100%

100%

Prohibited actions listed

100%

100%

Stop conditions stated

100%

100%

Approved systems documented

100%

100%

Time window documented

100%

100%

Baseline telemetry noted

100%

100%

Alerts observed field

75%

100%

Time to detect field

75%

100%

Time to contain field

62%

100%

Detection gaps field

87%

100%

Artifacts removed field

75%

100%

Validation notes field

75%

100%

Actions within boundaries

100%

100%

100%

31%

Post-Exploitation Report: Credential and Data Exposure Assessment

Credential exposure and business impact mapping

Criteria
Without context
With context

Credential exposure section present

0%

100%

Exposure path field

0%

100%

Affected assets/data field

0%

100%

Business risk field

55%

100%

Technical-to-business mapping

100%

100%

No real credentials in report

100%

100%

Lateral movement via trusts

100%

100%

Reproducibility without sensitive data

88%

100%

Credential access and reuse assessed

77%

100%

Data access paths documented

100%

100%

Cleanup section present

100%

100%

Actions within scope

100%

100%

Repository
santosomar/ethical-hacking-agent-skills
Evaluated
Agent
Claude Code
Model
Claude Sonnet 4.6

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.