Operations¶
Operational guides for running pentests safely and effectively.
- Safety Rules — 13 critical safety rules
- Stealth Mode — Rate limiting, TLS fingerprint, Chrome UA
- Multi-User Testing — Credentials, access matrix
- Docker — Container execution, tool installation
- VPN Routing — Docker VPN routing setup
- Proxy Integration — Burp Suite, Caido