Category: Reporting

sh00t

sh00t: open platform for manual bug hunters

Sh00t is a task manager that makes sure you “check that thing”. provides checklists with which you will never regret forgetting to “test that thing”. helps to easily handle custom bug templates that can...

prithvi

prithvi: A Report Generation Tool for Security Assessment

Prithvi A Report Generation Tool for Security Assessment Technology Used Angularjs for frontend MySQL as Database NodeJS (ExpressJS) as our backend Setup Clone the repo: git clone https://github.com/vegabird/prithvi.git Create Database `reporting` in a server (We used...

dart

DART: A Documentation and Reporting Tool

DART: A Documentation and Reporting Tool DART is a test documentation tool created by the Lockheed Martin Red Team to document and report on penetration tests, especially in isolated network environments. The goals of...

Deep Exploit

Deep Exploit: Fully automatic penetration test tool using Machine Learning

Deep Exploit Fully automatic penetration test tool using Machine Learning. Deep Exploit is fully automated penetration tool linked with Metasploit. Deep Exploit has two exploitation modes. Intelligence mode Deep Exploit identifies the status of all opened...

vulnreport: Open-source pentesting management and automation platform

Vulnreport Pentesting management and automation platform Vulnreport is a platform for managing penetration tests and generating well-formatted, actionable findings reports without the normal overhead that takes up security engineer’s time. The platform is built...

Simple Vulnerability Manager

Simple Vulnerability Manager It’s a program created to perform a vulnerability analysis of all the project handled by the Pentester, Project Managers or Customers of your company and automatically generate a Word reports. You...

Kali Linux 2018.3

Penetration Testing with Kali Linux Methodology

Kali Linux is designed for penetration testing. Whether the penetration tester’s starting point is white-box testing, black-box testing, or gray-box testing, there are always steps to follow when performing penetration testing with Kali or...