PTER Knowledge Base
Agent phases, vulnerability playbooks, skills, and prompt reference
Phases
8 penetration testing phases from program analysis through deep exploitation.
- Program Analysis
- Domain Exploration
- Business Logic Analysis
- Vulnerability Recon
- Deep Investigation
- Validation & Submission
- Vulnerability Chaining
- Deep Exploitation
Playbooks
21 vulnerability playbooks with detection methodology, payloads, and exploitation techniques.
- XSS (4 variants)
- SQL Injection (5 variants)
- SSTI (4 engine groups)
- SSRF (2 variants)
- Authentication Bypass (5 variants)
- + 16 more categories
Skills
6 reusable agent procedures for endpoint, service, task, and assessment registration.
- Register Endpoint
- Register Service
- Register Task
- Register Assessment
- Update Endpoint
- Update Service
Prompts
Agent system prompts, MCP tool reference, chat personas, auth flows, and templates.
- Agent System Prompt
- MCP Tool Reference
- Chat Personas (Peter, CISO)
- Auth Flows
- Engagement Templates
- Subagent Prompts