Other Templates

Strobes ships with templates beyond Web App, Network, and API. This article gives a quick overview of the remaining templates — what they're for, what input they need, and what credentials they typically use.

Choosing the right template

Templates are grouped by category in the wizard:

  • Assessments — point-in-time pentests (Web App, Network, API, Cloud Review, Code Review, Threat Model, AD, Hello World).
  • Continuous Programs — always-on monitoring (Attack Surface Monitoring, DevSecOps Pipeline).
  • Campaigns — time-boxed engagements (Red Team, Threat Hunting).

Pick the category that matches your goal, then drill into the specific template.

Code Review

Security-focused code review that ingests a Git repository, runs SAST scans, audits dependencies for CVEs, detects secrets, and performs a deep security review.

  • Required input: Repository URL (e.g., https://github.com/acme/webapp).
  • Common credentials: GitHub / GitLab / Bitbucket token.

Threat Model

Systematic threat modeling that scopes the system, maps data flows, and identifies threats using STRIDE, then models realistic attack scenarios.

  • Required input: Target URL or system description.
  • Common credentials: None.

Cloud Review

Cloud infrastructure security review that verifies credentials, enumerates resources, audits IAM permissions, and reviews storage and encryption settings.

  • Required input: Cloud account ID.
  • Common credentials: AWS read-only role / GCP / Azure.

Attack Surface Monitoring

Continuous external attack-surface discovery — enumerates subdomains, scans ports and services, fingerprints web technologies, and detects changes over time.

  • Required input: Root domain.
  • Common credentials: DNS provider, cloud account.

DevSecOps Pipeline

Continuous security scanning for CI/CD — connects to a repository, runs SAST and dependency scanning on every relevant change, and detects new findings as they're introduced.

  • Required input: Repository URL.
  • Common credentials: Git provider token.

Red Team

Time-boxed red-team / adversary-simulation engagement that performs OSINT recon, initial access, lateral movement, privilege escalation, and objective completion.

  • Required input: Target scope.
  • Common credentials: Variable, scenario-dependent.

Threat Hunting

Proactive, IOC-driven hunt across your environment — gathers threat intelligence, formulates hypotheses, and searches for indicators of compromise across cloud logs and audit trails.

  • Required input: Time range and targets.
  • Common credentials: AWS CloudTrail, GitHub audit logs.

Active Directory Pentest

Active Directory penetration test that uses a shell-based jump host. Scope and asset creation, domain recon, user / group / ACL enumeration, BloodHound-style path discovery.

  • Required input: Target IP / Range with shell access.
  • Common credentials: Domain user account.

Hello World

Quick demo or test workflow that skips the heavy phases. Use this template when you just want to see how a Strobes assessment looks end-to-end without consuming many AI credits.

  • Required input: Any URL.
  • Common credentials: None — demo only.

 

Was this article helpful?