Agent-Skills-Hub pentest-data-exfil-tester

Test egress and DLP controls using synthetic canary data across authorized exfiltration channels.

install
source · Clone the upstream repo
git clone https://github.com/0x-Professor/Agent-Skills-Hub
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/0x-Professor/Agent-Skills-Hub "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/pentest-data-exfil-tester" ~/.claude/skills/0x-professor-agent-skills-hub-pentest-data-exfil-tester && rm -rf "$T"
manifest: skills/pentest-data-exfil-tester/SKILL.md
source content

Pentest Data Exfil Tester

Stage

  • PTES: 6
  • MITRE: TA0010 - Exfiltration

Objective

Measure blocked versus successful exfiltration pathways using synthetic records only.

Required Workflow

  1. Validate scope before any active action and reject out-of-scope targets.
  2. Run only authorized checks aligned to PTES, OWASP WSTG, NIST SP 800-115, and MITRE ATT&CK.
  3. Write findings in canonical finding_schema format with reproducible PoC notes.
  4. Honor dry-run mode and require explicit --i-have-authorization for live execution.
  5. Export deterministic artifacts for downstream skill consumption.

Execution

python skills/pentest-data-exfil-tester/scripts/data_exfil_tester.py --scope scope.json --target <target> --input <path> --output <path> --format json --dry-run

Outputs

  • exfil-channels-tested.json
  • dlp-gaps.json
  • exfil-report.json

References

  • references/tools.md
  • skills/autonomous-pentester/shared/scope_schema.json
  • skills/autonomous-pentester/shared/finding_schema.json

Legal and Ethical Notice

WARNING AUTHORIZED USE ONLY
This skill executes real security testing tools against live targets.
Use only with written authorization.