Skip to main content

PTER Knowledge Base

Agent phases, vulnerability playbooks, skills, and prompt reference

Phases

8 penetration testing phases from program analysis through deep exploitation.

  • Program Analysis
  • Domain Exploration
  • Business Logic Analysis
  • Vulnerability Recon
  • Deep Investigation
  • Validation & Submission
  • Vulnerability Chaining
  • Deep Exploitation

Playbooks

21 vulnerability playbooks with detection methodology, payloads, and exploitation techniques.

  • XSS (4 variants)
  • SQL Injection (5 variants)
  • SSTI (4 engine groups)
  • SSRF (2 variants)
  • Authentication Bypass (5 variants)
  • + 16 more categories

Skills

6 reusable agent procedures for endpoint, service, task, and assessment registration.

  • Register Endpoint
  • Register Service
  • Register Task
  • Register Assessment
  • Update Endpoint
  • Update Service

Prompts

Agent system prompts, MCP tool reference, chat personas, auth flows, and templates.

  • Agent System Prompt
  • MCP Tool Reference
  • Chat Personas (Peter, CISO)
  • Auth Flows
  • Engagement Templates
  • Subagent Prompts