The Penetration Testing Execution Standard Logo

The Penetration Testing Execution Standard

0
Free
Visit Website

The penetration testing execution standard consists of seven main sections, covering everything related to a penetration test, from initial communication to reporting. The standard is divided into seven main sections: 1. Introduction and Planning 2. Intelligence Gathering and Threat Modeling 3. Vulnerability Research 4. Exploitation and Post-Exploitation 5. Reporting This version can be considered a v1.0, with a v2.0 in the works, providing more granular work in terms of 'levels' - as in intensity levels at which each of the elements of a penetration test can be performed at.

FEATURES

ALTERNATIVES

A blog post discussing the often overlooked dangers of CSV injection in applications.

CTF toolkit for rapid exploit development and prototyping.

A suite of tools for Wi-Fi network security assessment and penetration testing.

Ebowla is a tool for generating payloads in Python, GO, and PowerShell with support for Reflective DLLs.

A tool for detecting and taking over subdomains with dead DNS records

A wargaming network for penetration testers to practice their skills in a realistic environment.

A customized Kali Linux distribution for ICS/SCADA pentesting professionals

A modern post-exploitation command and control framework with a client-server architecture and extensibility features.