The Penetration Testing Execution Standard Logo

The Penetration Testing Execution Standard

0
Free
Visit Website

The penetration testing execution standard consists of seven main sections, covering everything related to a penetration test, from initial communication to reporting. The standard is divided into seven main sections: 1. Introduction and Planning 2. Intelligence Gathering and Threat Modeling 3. Vulnerability Research 4. Exploitation and Post-Exploitation 5. Reporting This version can be considered a v1.0, with a v2.0 in the works, providing more granular work in terms of 'levels' - as in intensity levels at which each of the elements of a penetration test can be performed at.

FEATURES

ALTERNATIVES

Ebowla is a tool for generating payloads in Python, GO, and PowerShell with support for Reflective DLLs.

A repository containing material for Android greybox fuzzing with AFL++ Frida mode

A penetration testing framework for identifying and exploiting vulnerabilities.

A specification/framework for extending default C2 communication channels in Cobalt Strike

Tool for exploiting Sixnet RTUs to gain root level access with little effort.

Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.

Macro_Pack is a tool used to automate obfuscation and generation of Office documents for pentest, demo, and social engineering assessments.

A framework for testing and exploiting race conditions in software