This repository is made to create your own pentesting reports based on the following templates.
☆27Feb 5, 2025Updated last year
Alternatives and similar repositories for pentesting-report-generator
Users that are interested in pentesting-report-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Smart pentesting report template in LaTeX, with graphical CVSSv3 score representation.☆32Jul 24, 2024Updated last year
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- Pentest report writing guide☆19Updated this week
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Repository to store all audits from public contests, bug bounty programmes☆11Apr 23, 2024Updated last year
- Pentest report framework without data send☆19Sep 23, 2025Updated 6 months ago
- Fire-AV is a collection of lists that you can use to block av providers and bad ips☆21Updated this week
- I used the Templater community plugin in obsidian to automatically populate IP,username,password☆44Sep 11, 2023Updated 2 years ago
- PowerShell-based Windows Server Security Audit Engine by Cyb3rint3l Labs. Measures alignment with the NIS2 directive and maps findings to…☆42Feb 1, 2026Updated 2 months ago
- Golang CLI binary used for installing and managing Ghostwriter☆19Apr 9, 2026Updated last week
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Burp Suite extension to easily export sub domains☆12Dec 2, 2019Updated 6 years ago
- This script will bruteforce the credential of tomcat manager or host-manager☆33Jun 24, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated last month
- ☆15May 6, 2023Updated 2 years ago
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆23Jan 28, 2019Updated 7 years ago
- ☆11Jun 30, 2025Updated 9 months ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Compilation of scripts/tools (made by me or not) that help me with Pentest and Bug Bounty.☆25Dec 22, 2025Updated 3 months ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 9 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆41Apr 1, 2026Updated 2 weeks ago
- My gfPatterns☆15Aug 31, 2021Updated 4 years ago
- Space theme for KDE☆25Dec 18, 2024Updated last year
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago
- How to do recon on a web-application properly☆15Jul 12, 2022Updated 3 years ago
- RedTeam - Red Team Tools☆49Oct 30, 2022Updated 3 years ago
- Security Assessment Report geNerated Automatically☆42Sep 26, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Detection: Identify the presence of the Ploutus malware by checking for known indicators of compromise (IoCs) such as specific files, reg…☆11Sep 5, 2024Updated last year
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Feb 9, 2024Updated 2 years ago
- ☆16May 17, 2024Updated last year
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆19Mar 26, 2025Updated last year
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆39Aug 14, 2024Updated last year
- A simple Bash script to discover all domains associated with a specific Microsoft 365 tenant - new replacement for check_mdi☆48Sep 23, 2025Updated 6 months ago
- ☆32Mar 28, 2025Updated last year