Download and use these report templates, methodologies and compliance packages to be productive from day one.
Use this blank Excel report template as a starting point, then populate the "auto" tab with your custom functions.
Published by: Security Roots Ltd.
Custom Excel report organized by CVSSv3 base score, complete with a bar chart showing the number of issues by risk rating.
Published by: Security Roots Ltd.
Default gateway.html.erb template. Use this as a starting point when customizing your team's Gateway layout.
Published by: Security Roots Ltd.
Bundled Gateway theme. Use this as a starting point when customizing your team's Gateway layout.
Published by: Security Roots Ltd.
Bundled Gateway theme. Use this as a starting point when customizing your team's Gateway layout.
Published by: Security Roots Ltd.
Not everything is Word! You can create comprehensive HTML reports with charts and detailed issue descriptions.
Published by: Security Roots Ltd.
A kit with sample templates and a sample project to try out Dradis' functionality.
Published by: Security Roots Ltd.
Use Dradis notes for your conclusions, sort your findings by severity, make use of document properties for things like project and client name, etc.
Published by: Security Roots Ltd.
A really simple, "no frills" report template that covers the basic reporting capabilities.
Published by: Security Roots Ltd.
Start from a Nessus XML output file and convert it into a custom Word document with whatever branding you want.
Published by: Security Roots Ltd.
Learn how to group your issues and filter and sort them by priority.
Published by: Security Roots Ltd.
Learn how to create reports where you not only provide a list of findings but also a list of which findings affect what hosts and the evidence associated with each instance.
Published by: Security Roots Ltd.
Learn how to create custom table styles for your reports.
Export your Dradis tables into beautiful Word tables.
Published by: Security Roots Ltd.
The OCR HIPAA Audit program analyzes processes, controls, and policies of selected covered entities pursuant to the HITECH Act audit mandate.
HIPAA Compliance Audit Protocol details
Published by: Security Roots Ltd.
The OSCP examination consists of a virtual network containing targets of varying configurations and operating systems.
OSCP compliance package details
Published by: Security Roots Ltd.
It is a standard designed to provide businesses and security service providers with a common language and scope for performing penetration testing.
PTES compliance package details
Published by: Security Roots Ltd.
The OWASP testing guide is one of the most commonly used standards for web application penetration testing and testing software throughout the development life cycle.
The testing framework was created to help people understand how, where, when, why, and where to test web applications.
The OWASP Testing Guide v4 compliance package details
OWASP Testing Guide official site
Published by: Security Roots Ltd.
Follow the Open Source Security Testing Methodology Manual in your projects.
Published by: Kevin Stagat
The primary aim of the OWASP Application Security Verification Standard (ASVS) Project is to provide an open application security standard for web apps and web services of all types.
The standard provides a basis for designing, building, and testing technical application security controls, including architectural concerns, secure development lifecycle, threat modelling, agile security including continuous integration / deployment, serverless, and configuration concerns.
Published by: Security Roots Ltd.
Follow the OWASP Mobile Security Testing Guide in your projects.
Published by: Security Roots Ltd.
Featuring the latest OWASP Top 10 release candidate list.
Vojtech Ruzicka: OWASP Top Ten 2017
StackPath: OWASP TOP 10 2017 IS HERE!
Published by: Security Roots Ltd.
Featuring the 2021 OWASP Top 10 in methodology template form
Published by: Security Roots Ltd.
A bit of everything, from information gathering to card payments and HTML 5.
Published by: ScotSTS
The SWAT Checklist from SANS Securing the App is meant to be the first step toward building a base of secure knowledge around web application security.
Published by: Security Roots Ltd.
Straight from the webapp security bible, this is a checklist of the tasks you typically need to perform when carrying out a comprehensive attack against a web application.
Published by: Security Roots Ltd.