<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Michael Mboya</title>
    <description>The latest articles on DEV Community by Michael Mboya (@michael_mboya).</description>
    <link>https://dev.to/michael_mboya</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3934401%2F34f0f2e9-c500-4d3d-9a44-972b22d701e8.png</url>
      <title>DEV Community: Michael Mboya</title>
      <link>https://dev.to/michael_mboya</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/michael_mboya"/>
    <language>en</language>
    <item>
      <title>I Built a 14-Blade Pentesting Framework at 22 — Here's What I Learned</title>
      <dc:creator>Michael Mboya</dc:creator>
      <pubDate>Sat, 16 May 2026 07:29:58 +0000</pubDate>
      <link>https://dev.to/michael_mboya/i-built-a-14-blade-pentesting-framework-at-22-heres-what-i-learned-3g2a</link>
      <guid>https://dev.to/michael_mboya/i-built-a-14-blade-pentesting-framework-at-22-heres-what-i-learned-3g2a</guid>
      <description>&lt;h1&gt;
  
  
  I Built a 14-Blade Pentesting Framework at 22 — Here's What I Learned
&lt;/h1&gt;

&lt;p&gt;I'm a third-year telecommunications engineering student in Kenya. I'm also a self-taught penetration tester. A few months ago, I got tired of running 15 different tools manually for every security assessment. So I built something to fix that.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I Built
&lt;/h2&gt;

&lt;p&gt;Pentest CoPilot — a 14-blade Swiss Army Knife for penetration testing. 26 tools covering the entire kill chain from reconnaissance to reporting.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Full Arsenal
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Blade 1: Reconnaissance&lt;/strong&gt; — AI-powered scanning. Ports, hidden directories, subdomains, CMS detection, URL parameters. Local AI (Ollama/LLaMA 3.2) correlates findings and generates an attack matrix with specific CVEs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 2: API Discovery&lt;/strong&gt; — Detects REST (Swagger/OpenAPI), GraphQL (introspection queries), gRPC (reflection), WebSocket endpoints, and SOAP (WSDL enumeration). Finds what most scanners miss.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 3: Credential Extraction&lt;/strong&gt; — Pulls API keys, access tokens, internal IP addresses, database connection strings, and configuration paths from exposed endpoints.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 4: Vulnerability Mapping&lt;/strong&gt; — Full kill chain analysis. Maps initial access vectors through privilege escalation to root exploitation. Kernel-level firewall mapping with ICMP tunneling detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 5: Server Exploitation (7 Types)&lt;/strong&gt; — Auto-detects and exploits: Kestrel/.NET, Apache Tomcat, Node.js/Express, PHP/Apache, Python Flask/Django, IIS/.NET, and Nginx. Each has a dedicated exploit script.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 6: Database Exploitation (7 Types)&lt;/strong&gt; — MySQL (empty root, UDF escalation), PostgreSQL (COPY FROM PROGRAM RCE), MSSQL (xp_cmdshell), MongoDB (no-auth dump), Redis (SSH key injection), Oracle (default credentials), Elasticsearch (no-auth index dump).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 7: Firewall Bypass &amp;amp; Reverse Shell Arsenal&lt;/strong&gt; — Custom TCP fragmentation engine splits payloads into tiny pieces to evade inspection. 12 payload types including SQL injection, buffer overflow, and command injection. Reverse shell generator supporting 8 languages (Bash, Python, Netcat, PHP, Perl, Ruby, PowerShell, Netcat+Mkfifo). "Bombard" mode fires all 8 shells simultaneously.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 8: Lateral Movement&lt;/strong&gt; — Internal subnet scanner for 172.x, 10.x, and 192.168.x ranges. Pivot fragmenter for routing attacks through compromised hosts. CGI dropper for web shell deployment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 9: Privilege Escalation&lt;/strong&gt; — 8 Linux vectors (sudo, SUID, kernel exploits, cron, writable paths, capabilities, SSH keys, password files) and 7 Windows vectors (token privileges, unquoted service paths, AlwaysInstallElevated, registry credentials, scheduled tasks, stored credentials, UAC bypass).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 10: Exfiltration&lt;/strong&gt; — 8 data collection modules (credentials, databases, private keys, source code, network info, browser data, full package). 6 exfiltration methods (HTTP, Netcat, Base64, SCP, DNS tunneling, ICMP tunneling).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 11: Persistence&lt;/strong&gt; — 8 Linux backdoors (SSH key, cron, systemd, bashrc, MOTD, PAM backdoor, LD_PRELOAD, hidden user) and 6 Windows backdoors (scheduled task, registry run, WMI subscription, startup folder, service, hidden admin).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 12: Cleanup&lt;/strong&gt; — 12 Linux cleanup steps (bash history, SSH backdoor, cron jobs, systemd services, bashrc, MOTD, hidden user, LD_PRELOAD, system logs, web server logs, temp files, memory) and 8 Windows cleanup steps.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 13: Reporting&lt;/strong&gt; — Generates professional PDF reports with executive summary, technical findings, attack vector matrix, and remediation recommendations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 14: Master Compiler&lt;/strong&gt; — One command runs all 13 phases automatically. Generates a timestamped report directory with every finding organized and documented.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Makes It Different
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Local AI — No Cloud, No API Keys.&lt;/strong&gt; Most security tools that claim "AI" send your data to OpenAI. Mine runs LLaMA 3.2 locally via Ollama. Your targets stay on your machine.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fragmentation Engine.&lt;/strong&gt; I built a custom TCP fragmentation engine that splits payloads into tiny pieces to bypass firewalls. It's not magic — it's packet crafting with Scapy. But it works against production firewalls.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;One Directory. Everything Included.&lt;/strong&gt; No Docker, no databases, no complex setup. Clone the repo, run the installer, and you have a complete pentesting arsenal.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I Learned
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Build for yourself first.&lt;/strong&gt; I built this because I needed it. That's why it's actually useful — not just a portfolio piece.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AI is a force multiplier.&lt;/strong&gt; Ollama analyzes scan results and generates attack matrices with specific CVEs. What took 2 hours of manual correlation now takes seconds.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shipping beats perfection.&lt;/strong&gt; The first version was buggy. The current version works against production targets. I shipped, tested, fixed, and repeated.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Your portfolio is your degree.&lt;/strong&gt; I don't have a cybersecurity degree. I have a GitHub repo that proves I can build, test, and document a complex security tool spanning the entire kill chain.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's Next
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Add Nuclei template scanning for automated vulnerability validation&lt;/li&gt;
&lt;li&gt;Build a web dashboard for real-time engagement monitoring&lt;/li&gt;
&lt;li&gt;Turn it into a SaaS platform for Kenyan SMEs who can't afford enterprise security tools&lt;/li&gt;
&lt;li&gt;Add collaborative features for red team operations&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Advice for Other Self-Taught Developers
&lt;/h2&gt;

&lt;p&gt;Stop waiting for permission. Build something that solves your own problem. Document it thoroughly. Ship it publicly. The platform you need doesn't exist yet — so build that too.&lt;/p&gt;

&lt;p&gt;The difference between a "hacker" and a "security researcher" is often just permission and a paycheck. Same skills. Same mindset. Build the bridge between them.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;GitHub:&lt;/strong&gt; &lt;a href="https://github.com/michaelmboya149-lab/PentestCoPilot-Swiss-army-knife" rel="noopener noreferrer"&gt;github.com/michaelmboya149-lab/PentestCoPilot-Swiss-army-knife&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;I'm looking for:&lt;/strong&gt; Security engineering roles, pentesting opportunities, and collaborators in the Kenyan infosec space. If you're building in this space, let's talk.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>cybersecurity</category>
      <category>python</category>
      <category>webtesting</category>
    </item>
  </channel>
</rss>
