Synced from an Obsidian vault
For graph and advanced features, download the full Intel Codex Vault and open it in Obsidian.
Penetration Testing SOPs
This directory contains Standard Operating Procedures (SOPs) for penetration testing across various domains and platforms.
Available Pentesting SOPs
Infrastructure & Systems
Applications & Development
Offensive Security
Defensive & Forensics
Purpose
These SOPs provide standardized procedures for:
- Conducting security assessments and penetration tests
- Identifying and exploiting vulnerabilities
- Testing security controls and defensive measures
- Researching new vulnerabilities and attack techniques
Common Workflows
Web Application Testing
- Web Application Security - OWASP Top 10
- Bug Bounty - For responsible disclosure
- Vulnerability Research - For novel vulnerabilities
Infrastructure Pentesting
- Linux Pentesting - Unix/Linux systems
- Active Directory Pentesting - Windows environments
- Detection Evasion - Bypassing defenses
Mobile & Embedded
- Mobile Security - iOS/Android applications
- Firmware RE - IoT and embedded devices
- Vulnerability Research - For exploit development
Post-Exploitation & Investigation
- Detection Evasion - Maintaining access
- Forensics Investigation - Evidence collection
Navigation
- Return to Start
- See also: Analysis SOPs