
A complete, integrated audit skill set covering the full lifecycle from network scanning through risk reporting. Six skills. One unified pipeline. Full NIST framework alignment.
Each skill covers a distinct phase of the audit lifecycle, aligned with specific NIST frameworks and producing structured, importable outputs.
All skills integrate through structured JSON output. Findings from every audit phase flow into the central Risk Assessment engine for consolidated scoring and reporting.

Real results from running all six skills against a simulated environment. Each tab shows the output from a different audit phase.
| Port | Proto | State | Service | Version |
|---|---|---|---|---|
| 22 | tcp | open | ssh | OpenSSH 8.9p1 |
| 5900 | tcp | open | vnc | VNC |
| 5901 | tcp | open | http | Golang net/http |
| 8333 | tcp | open | bitcoin |
HIGH: VNC Port 5900 Exposed
Risky port open and externally accessible. Use VPN and strong authentication. NIST SC-7.

All findings from the six audit skills consolidated into a single, prioritized risk register scored using the NIST 5x5 risk matrix.

Follow the structured 8-phase playbook for a complete, repeatable ethical hacking audit.
Define scope, obtain written authorization, set ROE
ManualRun network-vuln-scanner against target subnets
network-vuln-scannerRun security-config-auditor on all in-scope systems
security-config-auditorExecute penetration-testing workflow per NIST 800-115
penetration-testingAudit governance docs with policy-governance-auditor
policy-governance-auditorAssess IR plan with incident-response-auditor
incident-response-auditorImport all findings, score and prioritize
risk-assessment-reportingCompile reports, risk register, and POA&M
All SkillsEvery skill maps directly to established cybersecurity frameworks, ensuring audit results are defensible and compliance-ready.
| Skill | Primary Framework | Secondary | Key Controls | CSF Functions |
|---|---|---|---|---|
| Net Scan | NIST SP 800-115 | NIST 800-53 (RA, CA) | RA-5, CA-8, SI-2 | IdentifyDetect |
| Config Audit | CIS Benchmarks | NIST 800-53 (CM, SC, AC) | CM-6, CM-7, SC-7, AC-3 | Protect |
| Pen Test | NIST SP 800-115 | OWASP Top 10, CISA KEV | CA-8, RA-5, SI-10 | IdentifyRespond |
| Policy Audit | NIST CSF 2.0 | NIST 800-53 (All families) | PM-1, PL-1, PL-2, AT-1 | GovernProtect |
| IR Audit | NIST SP 800-61 Rev 3 | CISA IR Guidelines | IR-1 through IR-8 | DetectRespondRecover |
| Risk Report | NIST SP 800-37 (RMF) | NIST 800-30, FIPS 199 | RA-3, PM-9, CA-5 | IdentifyGovern |