This repository is made to create your own pentesting reports based on the following templates.
☆27Feb 5, 2025Updated last year
Alternatives and similar repositories for pentesting-report-generator
Users that are interested in pentesting-report-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Smart pentesting report template in LaTeX, with graphical CVSSv3 score representation.☆32Jul 24, 2024Updated last year
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- Excel parser for various pentesting tools.☆31Jun 13, 2023Updated 2 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Repository to store all audits from public contests, bug bounty programmes☆11Apr 23, 2024Updated last year
- Fire-AV is a collection of lists that you can use to block av providers and bad ips☆21Mar 22, 2026Updated last week
- Mobile CTF☆30Mar 10, 2018Updated 8 years ago
- My public findings/reports from decentralized audits, select bug bounty programs and engagements☆13Updated this week
- I used the Templater community plugin in obsidian to automatically populate IP,username,password☆44Sep 11, 2023Updated 2 years ago
- This script will bruteforce the credential of tomcat manager or host-manager☆32Jun 24, 2020Updated 5 years ago
- ☆15May 6, 2023Updated 2 years ago
- ☆11Jun 30, 2025Updated 8 months ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- header-fuzz allows you to fuzz any HTTP header with a wordlist and evaluate success or failure based on the returning HTTP status code.☆16Apr 15, 2020Updated 5 years ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆13May 10, 2022Updated 3 years ago
- Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like P…☆32Oct 3, 2025Updated 5 months ago
- Space theme for KDE☆14Dec 18, 2024Updated last year
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 8 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆41Dec 2, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A cyber security toolkit blending manual testing with AI Agents☆114Updated this week
- My gfPatterns☆15Aug 31, 2021Updated 4 years ago
- RedTeam - Red Team Tools☆49Oct 30, 2022Updated 3 years ago
- Bring your own Unwind Data Framework☆105Mar 15, 2026Updated 2 weeks ago
- An experimental open-source attempt to make GPT-4 fully autonomous.☆15Apr 13, 2023Updated 2 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆36Dec 8, 2023Updated 2 years ago
- Detection: Identify the presence of the Ploutus malware by checking for known indicators of compromise (IoCs) such as specific files, reg…☆11Sep 5, 2024Updated last year
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Feb 9, 2024Updated 2 years ago
- Saleae ARM Serial Wire Debug (SWD) Analyzer☆20Oct 23, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Screendown - 📸 Capture stunning screenshots of your Markdown or code directly in Visual Studio Code with ease.☆25Jan 10, 2024Updated 2 years ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆38Aug 14, 2024Updated last year
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆279Mar 15, 2026Updated 2 weeks ago
- Configuration files for BonoboSWD cable☆26Jul 15, 2020Updated 5 years ago
- Deploy single vSphere VM with Terraform - template.☆22Sep 3, 2017Updated 8 years ago
- Windows usermode rootkit with inline hooking for process/file/registry hiding, indirect syscalls, keylogger, HTTPS C2, dropper, and EDR/A…☆33Jan 22, 2026Updated 2 months ago
- An elegant and flavored dark theme for vs code☆23Nov 8, 2018Updated 7 years ago