📄️ Overview
Introdution
📄️ Quickstart
This page covers the process of setting up an IaaS layer automated pentesting pipeline.
📄️ Tools Description
The following tools make up the automated pentesting pipeline.
📄️ Using Automated Pentesting Reports for CSPs, Operators, and Users
This section outlines how Infrastructure Operators (Cloud Service Providers - CSPs) and users can leverage automated pentesting reports focused on Infrastructure-as-a-Service (IaaS) and Container-as-a-Service (CaaS) environments.