Playbook Builder
Create, manage, and execute operational playbooks for security engagements. Track tasks, collect evidence, and maintain comprehensive documentation throughout your operations.
Information
Playbook Builder
Create and manage operational playbooks for security engagements
🔴 Red Team Operations
(2 templates)Red Team Engagement
red-teamComprehensive adversary simulation engagement playbook covering reconnaissance through objective completion
Social Engineering Campaign
red-teamMulti-vector social engineering assessment including phishing, vishing, and physical security testing
🚨 Incident Response
(2 templates)Incident Response Playbook
incident-responseComprehensive incident response playbook following NIST IR lifecycle
Ransomware Incident Response
incident-responseSpecialized incident response playbook for ransomware attacks including containment, eradication, and recovery
🟣 Purple Team Exercises
(1 template)Purple Team Exercise
purple-teamCollaborative red and blue team exercise to improve detection and response capabilities
🔵 Penetration Testing
(5 templates)Web Application Penetration Test
pentestComprehensive web application security assessment playbook
Network Infrastructure Penetration Test
pentestComprehensive internal network security assessment including network segmentation, device security, and lateral movement testing
Cloud Security Assessment (AWS/Azure/GCP)
pentestComprehensive cloud infrastructure security audit covering IAM, storage, compute, and network configurations
Mobile Application Penetration Test
pentestComprehensive security assessment of iOS and Android applications including static/dynamic analysis and API testing
Wireless Network Penetration Test
pentestComprehensive WiFi security assessment including WPA/WPA2/WPA3 testing, rogue AP detection, and Bluetooth security
📋 Compliance & Audits
(4 templates)Supply Chain Security Audit
complianceComprehensive third-party and vendor risk assessment including software supply chain security
Physical Security Assessment
complianceComprehensive facility security audit including perimeter, access controls, surveillance, and security policies
DevSecOps Pipeline Security Audit
complianceSecurity assessment of CI/CD pipelines, IaC, container registries, and deployment automation
Zero Trust Architecture Review
complianceComprehensive assessment of Zero Trust implementation including identity, devices, networks, and data protection
📖 How to Use
- 1. Browse templates and select one
- 2. Create playbook from template
- 3. Customize name and description
- 4. Check off tasks as you complete them
- 5. Add evidence files and notes
- 6. 🔐 Encrypt with password (optional)
- 7. Export as Markdown, PDF, JSON, or Secure Archive
Tip: Auto-saves every second. Your data never leaves your browser.
✨ Key Features
💡 Best Practices
⚙️ Technical Details
Warning