If you have a project to pentest, in first stage start with PENTESTON and take advantage of the result
Platform to test network devices, custom web applications, and internet telecommunication devices for security bugs and flaws that affect integrity, confidentiality, or system availability.