Base LaTeX template for a penetration test report.
☆41Mar 7, 2022Updated 4 years ago
Alternatives and similar repositories for Penetration-Test-Report-Template
Users that are interested in Penetration-Test-Report-Template are comparing it to the libraries listed below
Sorting:
- Scripts to automate standing up hosts in Linode☆15Feb 16, 2021Updated 5 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- Sample list of penetration test reports☆17Dec 12, 2016Updated 9 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- Example reports from prior years of the Collegiate Penetration Testing Competition☆159Oct 12, 2025Updated 4 months ago
- Collection of templates for linux☆10Jun 2, 2024Updated last year
- Smart pentesting report template in LaTeX, with graphical CVSSv3 score representation.☆32Jul 24, 2024Updated last year
- ☆10Feb 27, 2026Updated last week
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Nov 27, 2023Updated 2 years ago
- Excel parser for various pentesting tools.☆30Jun 13, 2023Updated 2 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- ☆12Dec 16, 2020Updated 5 years ago
- Proxy wired iOS internet connection and only allow cert server communication for safe agent signing☆13Aug 3, 2023Updated 2 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- List of OSINT Capture The Flag platforms☆34Updated this week
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- Python Exploitation Framework☆30Updated this week
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆279Mar 2, 2026Updated last week
- ☆45Oct 19, 2021Updated 4 years ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- The Simple Little Automator☆12Oct 2, 2025Updated 5 months ago
- ☆13Updated this week
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Feb 11, 2012Updated 14 years ago
- Benchmark Generator to create skeleton Ansible content from baseline XCCDF files.☆10Sep 10, 2020Updated 5 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- Scripts to get the most out of Tenable.io☆12Feb 10, 2021Updated 5 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Jan 7, 2021Updated 5 years ago
- Set up your own CTF with NIZKCTF☆14Oct 20, 2017Updated 8 years ago
- The golden AMI pipeline enables creation, distribution, verification, launch-compliance, and decommissioning of the golden AMI out of the…☆11Jan 8, 2020Updated 6 years ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- Docker Compose configuration for running n8n with PostgreSQL☆10Apr 13, 2025Updated 10 months ago
- ☆13Jun 26, 2025Updated 8 months ago
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated last year
- ☆11Jun 5, 2022Updated 3 years ago