The Penetration Testing Execution Standard Logo

The Penetration Testing Execution Standard

0
Free
Updated 11 March 2025
Visit Website

The penetration testing execution standard consists of seven main sections, covering everything related to a penetration test, from initial communication to reporting. The standard is divided into seven main sections: 1. Introduction and Planning 2. Intelligence Gathering and Threat Modeling 3. Vulnerability Research 4. Exploitation and Post-Exploitation 5. Reporting This version can be considered a v1.0, with a v2.0 in the works, providing more granular work in terms of 'levels' - as in intensity levels at which each of the elements of a penetration test can be performed at.

FEATURES

SIMILAR TOOLS

A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.

Hidden parameters discovery suite

A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.

Ebowla is a tool for generating payloads in Python, GO, and PowerShell with support for Reflective DLLs.

CredMaster enhances password spraying tactics with IP rotation to maintain anonymity and efficiency.

Stealing Signatures and Making One Invalid Signature at a Time.

A tool to remove malicious artifacts from Microsoft Office documents, preventing malware infections and data breaches.

Back-end component for red team operations with crucial design considerations.

A tool that finds more information about a given URL or domain by querying multiple data sources.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved