Babysitter Offensive Security Skill
Offensive security tools and techniques integration
install
source · Clone the upstream repo
git clone https://github.com/a5c-ai/babysitter
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/a5c-ai/babysitter "$T" && mkdir -p ~/.claude/skills && cp -r "$T/library/specializations/security-research/skills/offensive-security" ~/.claude/skills/a5c-ai-babysitter-offensive-security-skill && rm -rf "$T"
manifest:
library/specializations/security-research/skills/offensive-security/SKILL.mdsource content
Offensive Security Skill
Overview
This skill provides offensive security tools and techniques integration for red team operations.
Capabilities
- Execute Metasploit modules
- Generate Cobalt Strike payloads
- Create custom C2 channels
- Support Sliver/Havoc frameworks
- Perform credential harvesting
- Execute lateral movement
- Support phishing campaigns
- Generate custom implants
Target Processes
- red-team-operations.js
- network-penetration-testing.js
- purple-team-exercise.js
Dependencies
- Metasploit Framework
- Cobalt Strike (licensed)
- Sliver C2
- Havoc C2 (optional)
- Python/PowerShell
Usage Context
This skill is essential for:
- Red team engagements
- Adversary emulation
- Penetration testing
- C2 infrastructure setup
- Payload development
Integration Notes
- Supports multiple C2 frameworks
- Can generate evasive payloads
- Integrates with MITRE ATT&CK mapping
- Supports automated attack chains
- Can document TTPs used
Security Notice
This skill is intended for authorized security testing only. All activities must be conducted with proper authorization and within legal boundaries.