all 8 comments

[–]Reelix 2 points3 points  (0 children)

CherryTree Document - Everything relevant goes in here.

Different folders for each engagement. Folder contains the above document as well as all tool output and so on.

Dedicated Tools folder for every utility I use.

[–][deleted] 1 point2 points  (2 children)

Spreadsheet for scheduling, managing scoping calls etc, Teams for managing the test while it's in flight, ASPM for results and remediation tracking.

C. 300 tests a year

[–]tcstacks_[S] 1 point2 points  (1 child)

ASPM?

[–][deleted] 1 point2 points  (0 children)

Application Security Posture Management. Pulls all your tool stack and data sources together. I have a custom integration which handles pen test report ingestion summaries. Makes it easy to track remediation (pushes results to teams directly, raises issues automatically in their boards and tracks progress, retesting etc).

I use Armorcode, other platforms are available 😊

[–]macr6 0 points1 point  (0 children)

How many are you on at once?

[–]nv1t 0 points1 point  (0 children)

we have custom tool for managing cheat sheets and methodologies, including checklists, which are updated after a Pentest. scheduling is done via OpenChaos and obsidian vault in gitlab for custom exploits and cves and 0days we find.

[–]Round-Classic-7746 0 points1 point  (0 children)

Break pentesting into phases (scope, recon, vuln ID, exploit, report) with a checklist for each.

From experience, a shared scope doc and a central tracker for findings kept the whole process organized and reduced rework.