The penetration testing execution standard consists of seven main sections, covering everything related to a penetration test, from initial communication to reporting. The standard is divided into seven main sections: 1. Introduction and Planning 2. Intelligence Gathering and Threat Modeling 3. Vulnerability Research 4. Exploitation and Post-Exploitation 5. Reporting This version can be considered a v1.0, with a v2.0 in the works, providing more granular work in terms of 'levels' - as in intensity levels at which each of the elements of a penetration test can be performed at.
FEATURES
SIMILAR TOOLS
A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.
A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.
Ebowla is a tool for generating payloads in Python, GO, and PowerShell with support for Reflective DLLs.
CredMaster enhances password spraying tactics with IP rotation to maintain anonymity and efficiency.
A tool to remove malicious artifacts from Microsoft Office documents, preventing malware infections and data breaches.
Back-end component for red team operations with crucial design considerations.
A tool that finds more information about a given URL or domain by querying multiple data sources.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.