In the world of cybersecurity, where things change quickly, it’s important to do thorough and fast penetration testing. Here comes FACTION, a cutting-edge Penetration Testing Report Generation and Collaboration Engine that is meant to make the whole assessment process easier. This powerful tool not only automatically creates pen test reports, but it also lets peers review them, keeps track of changes, and lets people work together in real time. FACTION is a complete solution for handling security assessments and increasing team productivity in the field of cybersecurity. It has templates that can be changed to fit your needs, large databases of vulnerabilities, and easy integrations.
FACTION is your entire assessment workflow in a box. With FACTION you can:
Other Features:
Want to see it in action? -> Faction Video Overview
Run the following commands to build the war file and deploy it to the docker container.
git clone git@github.com:factionsecurity/faction.git
cd faction
mvn clean compile war:war
docker-compose up --build
Once the containers are up you can navigate to http://127.0.0.1:8080 to access your FACTION instance. On the first boot, it will ask you to create an admin account.
You can find out more information about creating your own custom report templates here: Custom Security Report Templates – Faction Security
We can provide hosting for your instance. All instances are single tenants so you don’t have to worry about sharing infrastructure with untrusted parties. Navigate to https://www.factionsecurity.com to learn more.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…