Pentest Runbooks & Checklists  

Standardize work with checklists, benchmarks & task lists 

Simplify quality control, task management, and work delegation, with pentest Checklists, Attack Chains and Benchmarks. Automatically map vulnerability findings to compliance norms.

Pentest Checklists

Streamline Your Testing Process and Methodologies

Structure your Testing Methodology

Set up pentest task lists and assign them to your team based on relevancy, availability, or skillset to easily trace who’s responsible for what and why.

Assignable Tasks

Assign checklist or specific tasks to individual pentesters or to your team as a whole for easier work delegation across the project.

Work Status

Pentesters mark work as finished as they complete tasks, to more easily enable cross-project collaboration and prevent repeat work. 

role management icon

Integrated Quality Controls

Share what’s checked for every pentest, with a repeatable process and documented work that’s easy to see and quality control. 

Benchmarks & Standards 

Pull from a library of pre-made benchmarks based on standards like ISO 27001 and PCI DSS or customize your own. 

Expert Pentesters

Compliance Standards

Use checklists for standards including ISO 27001, PCI DSS, Network Security VAPT, OWASP ASVS, OWASP MSTG 11.3, OWASP OTG, and OWASP Top 10. 

Automatic Pass/Fail Benchmarking

Every benchmark includes basic instructions for what to check and pass/fail scenarios in line with the compliance norm.

Icon of a magnifying glass and research

Full Customization

Customize an existing benchmark or import your own from Excel to ensure your work management exactly matches how you do pentests.

Generate Compliance Reports 

Generate and share compliance sections in reports, with data mapped to controls used, and framed in the context of the compliance norm. 

Magnifying glass over web page icon

AutoFill

Cyver Core uses AutoFill to generate CWE based on CVSS, and compliance controls based on CWE. You fill in one data pont, the platform does the rest.

Generate Compliance Sections

Add sections for every compliance norm relevant to your client. Cyver Core automatically frames vulnerabilities in the context of the controls used. 

role management icon

CVSS Calculator

Simplify building reports with our CVSS calculator and integrate that into compliance reports with a CVSS section listing findings by risk rating. 

Customize Norms  

Use our library of compliance norms like ISO 27001, PCI DSS, OWASP Top 10, the MITRE Attack Framework for red teaming, and many others, or build your own.

Expert Pentesters

Compliance Standards

Use standards for norms like ISO 27001, PCI DSS, Network Security VAPT, OWASP ASVS, OWASP MSTG 11.3, OWASP OTG, & OWASP Top 10.

compliance norms icon

Compliance Templates

Get runbooks, report templates, control instructions, and more with pentest norms built around compliance standards.

branding icon

Full Customization

Need a custom workflow? Build your own compliance norm or customize an existing one to exactly meet client and project needs.

Streamline quality assurance and work delegation with pentest runbooks for compliance frameworks

“It’s not just clients who benefit from us using Cyver Core, it’s our consultants as well. We’ve reduced overhead and manual work. Time to report and do quality assurance is a fraction of what it used to be. ” 

Cyber Security Analyst, Georgia USA

Anonymous

Full Features List

Download the Product Tour

Download our Product Tour to see features, benefits, and Cyver Core’s offerings in a shareable and printable PDF format.

DigiD Pentesting

Any questions?

We're here to help

What is a Pentest Management Platform?

Pentest Management Platforms like Cyver Core digitize pentest workflows, replacing manual communication and reports with digital workflows. It means real-time results, live communication with clients, and findings as tickets. Plus, we offer automated pentest reporting, complete with integrations for tools like Burp Suite, Nessus, NMap, & more. Our goal is to help pentesters save time (70-85% of time spent on every report), reduce overhead hours for pentest management, and deliver pentest-as-a-service to clients.

How is Cyver Core Secured?

Cyver Core is fully secured, regularly pentested, and regularly backed up. We maintain SOC2 compliant infrastructure, as verified by external auditors. All user data is stored redundantly and automatically backed up inside Microsoft Azure architecture, with fully redundant server architecture and network connectivity. We take security seriously, and you can see a full list of our security practices in our security policy.

Will My Clients See I Use Cyver Core?

No! Cyver Core is fully white label. When you onboard your clients to our platform, they see your branding and brand name. You can also fully customize reports, project templates, and other digital assets. Your clients, your brand, your digital privacy, powered by Cyver Core.

How Does Cyver Core Automate Workflows?

Cyver Core utilizes standardized workflows to automatically progress projects based on pre-defined parameters and settings. You set up project templates and Cyver Core automatically performs workflows inside those, to move the project from one stage to the next, to create Findings tickets from imported data, to notify stakeholders, and to schedule the next pentest. In addition, Cyver Core uses automation and Smart features to auto-fill tickets, to create projects, and to generate reports, so you have to do the minimum manual work possible. Visit our features page to learn more.