In the world of cybersecurity, where things change quickly, it’s important to do thorough and fast penetration testing. Here comes FACTION, a cutting-edge Penetration Testing Report Generation and Collaboration Engine that is meant to make the whole assessment process easier. This powerful tool not only automatically creates pen test reports, but it also lets peers review them, keeps track of changes, and lets people work together in real time. FACTION is a complete solution for handling security assessments and increasing team productivity in the field of cybersecurity. It has templates that can be changed to fit your needs, large databases of vulnerabilities, and easy integrations.
FACTION is your entire assessment workflow in a box. With FACTION you can:
Other Features:
Want to see it in action? -> Faction Video Overview
Run the following commands to build the war file and deploy it to the docker container.
git clone git@github.com:factionsecurity/faction.git
cd faction
mvn clean compile war:war
docker-compose up --build
Once the containers are up you can navigate to http://127.0.0.1:8080 to access your FACTION instance. On the first boot, it will ask you to create an admin account.
You can find out more information about creating your own custom report templates here: Custom Security Report Templates – Faction Security
We can provide hosting for your instance. All instances are single tenants so you don’t have to worry about sharing infrastructure with untrusted parties. Navigate to https://www.factionsecurity.com to learn more.
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…