# Pentest-Tools.com documentation > Build scalable offensive security workflows with Pentest-Tools.com. Get the tech specs for accurate, low-noise pentests and vulnerability assessments ## Docs - [Cancel and refunds](https://pentest-tools.com/docs/account-billing/billing/cancel-and-refunds.md): Cancellation process and refund policy - [Change plan](https://pentest-tools.com/docs/account-billing/billing/change-plan.md): Upgrade, downgrade, or modify your subscription - [Invoices](https://pentest-tools.com/docs/account-billing/billing/invoices.md): Access and manage your billing invoices - [Payment methods](https://pentest-tools.com/docs/account-billing/billing/payment-methods.md): Accepted payment methods and billing options - [Add-ons](https://pentest-tools.com/docs/account-billing/plans-and-limits/add-ons.md): Extend your subscription with VPN scanning and white-label branding capabilities - [Assets and limits](https://pentest-tools.com/docs/account-billing/plans-and-limits/assets-and-limits.md): Understand asset limits, scan cycles, and resource quotas for your subscription - [Plan overview](https://pentest-tools.com/docs/account-billing/plans-and-limits/plan-overview.md): Compare subscription plans and find the right fit for your security testing needs - [Account security](https://pentest-tools.com/docs/account-billing/security/account-security.md): Secure your Pentest-Tools.com account - [Data security](https://pentest-tools.com/docs/account-billing/security/data-security.md): How Pentest-Tools.com stores, protects, and handles your data - [Where to find policies](https://pentest-tools.com/docs/account-billing/security/where-to-find-policies.md): Legal documents, security certifications, and data handling information - [AI-enhanced authentication](https://pentest-tools.com/docs/ai/authentication.md): How AI improves automatic login form detection for authenticated scans - [MCP tools](https://pentest-tools.com/docs/ai/mcp/mcp-tools.md) - [MCP overview](https://pentest-tools.com/docs/ai/mcp/overview.md): Connect AI assistants to Pentest-Tools.com using the Model Context Protocol - [Soft 404 detector](https://pentest-tools.com/docs/ai/soft404detector.md): AI-powered detection of soft 404 error pages for cleaner scan results - [Authentication](https://pentest-tools.com/docs/api-reference/authentication.md): Authenticate your API requests to Pentest-Tools.com - [API examples](https://pentest-tools.com/docs/api-reference/examples.md): Python examples for common API workflows - [Get all finding templates](https://pentest-tools.com/docs/api-reference/finding_templates/get-all-finding-templates.md) - [Get all findings](https://pentest-tools.com/docs/api-reference/findings/get-all-findings.md) - [Get finding information by ID](https://pentest-tools.com/docs/api-reference/findings/get-finding-information-by-id.md) - [Get finding tests by ID](https://pentest-tools.com/docs/api-reference/findings/get-finding-tests-by-id.md): Get all tests associated with a finding. - [Clear the data for a logger](https://pentest-tools.com/docs/api-reference/http_loggers/clear-the-data-for-a-logger.md): Delete all the requests made to the HTTP logger. - [Create a HTTP logger](https://pentest-tools.com/docs/api-reference/http_loggers/create-a-http-logger.md) - [Delete a logger](https://pentest-tools.com/docs/api-reference/http_loggers/delete-a-logger.md) - [Get all HTTP loggers](https://pentest-tools.com/docs/api-reference/http_loggers/get-all-http-loggers.md) - [Get logger information by ID](https://pentest-tools.com/docs/api-reference/http_loggers/get-logger-information-by-id.md): Get logger information by ID. To see the requests made to the logger, see `/http_loggers/{id}/data` - [Get the data for a logger](https://pentest-tools.com/docs/api-reference/http_loggers/get-the-data-for-a-logger.md): Get a list of requests made to the logger - [API overview](https://pentest-tools.com/docs/api-reference/index.md): Programmatic access to Pentest-Tools.com capabilities - [Limits and errors](https://pentest-tools.com/docs/api-reference/limits-and-errors.md): Understand API rate limits and error handling - [Create a report](https://pentest-tools.com/docs/api-reference/reports/create-a-report.md) - [Delete a report](https://pentest-tools.com/docs/api-reference/reports/delete-a-report.md) - [Download a report](https://pentest-tools.com/docs/api-reference/reports/download-a-report.md) - [Get all reports](https://pentest-tools.com/docs/api-reference/reports/get-all-reports.md) - [Get report information by ID](https://pentest-tools.com/docs/api-reference/reports/get-report-information-by-id.md) - [Delete a scan](https://pentest-tools.com/docs/api-reference/scans/delete-a-scan.md): Delete a scan. - [Get all scans](https://pentest-tools.com/docs/api-reference/scans/get-all-scans.md) - [Get scan information by ID](https://pentest-tools.com/docs/api-reference/scans/get-scan-information-by-id.md): Get scan information by ID. For the output, see `/scans/{id}/output` - [Get scan output by ID](https://pentest-tools.com/docs/api-reference/scans/get-scan-output-by-id.md) - [Get scan raw output by ID](https://pentest-tools.com/docs/api-reference/scans/get-scan-raw-output-by-id.md) - [Get scan tests by ID](https://pentest-tools.com/docs/api-reference/scans/get-scan-tests-by-id.md): Get all tests associated with a scan. This is useful if you want to view all tests performed during a scan. Not all tests will result in a finding. - [Start a scan](https://pentest-tools.com/docs/api-reference/scans/start-a-scan.md) - [Stop an active scan](https://pentest-tools.com/docs/api-reference/scans/stop-an-active-scan.md) - [Create a target](https://pentest-tools.com/docs/api-reference/targets/create-a-target.md) - [Delete a Target](https://pentest-tools.com/docs/api-reference/targets/delete-a-target.md): Delete a target and its scans - [Get all targets](https://pentest-tools.com/docs/api-reference/targets/get-all-targets.md) - [Get target by ID](https://pentest-tools.com/docs/api-reference/targets/get-target-by-id.md) - [Get all VPN profiles](https://pentest-tools.com/docs/api-reference/vpn_profiles/get-all-vpn-profiles.md) - [Delete a wordlist](https://pentest-tools.com/docs/api-reference/wordlists/delete-a-wordlist.md) - [Get all wordlists](https://pentest-tools.com/docs/api-reference/wordlists/get-all-wordlists.md) - [Get wordlist contents by ID](https://pentest-tools.com/docs/api-reference/wordlists/get-wordlist-contents-by-id.md) - [Get wordlist information by ID](https://pentest-tools.com/docs/api-reference/wordlists/get-wordlist-information-by-id.md): Get the details of a wordlist. For contents, use `/wordlists/{id}/contents` - [Create a workspace](https://pentest-tools.com/docs/api-reference/workspaces/create-a-workspace.md) - [Delete workspace](https://pentest-tools.com/docs/api-reference/workspaces/delete-workspace.md): Deletes a workspace and all of its assets. - [Edit workspace](https://pentest-tools.com/docs/api-reference/workspaces/edit-workspace.md) - [Get all workspaces](https://pentest-tools.com/docs/api-reference/workspaces/get-all-workspaces.md) - [Get workspace by ID](https://pentest-tools.com/docs/api-reference/workspaces/get-workspace-by-id.md) - [Attack surface](https://pentest-tools.com/docs/capabilities/attack-surface.md): View and manage discovered assets aggregated from scan results - [AWS integration](https://pentest-tools.com/docs/capabilities/integrations/aws.md): Import targets from your AWS infrastructure - [Burp Suite integration](https://pentest-tools.com/docs/capabilities/integrations/burp.md): Push Burp Suite findings directly to Pentest-Tools.com - [Discord integration](https://pentest-tools.com/docs/capabilities/integrations/discord.md): Receive scan notifications and alerts in your Discord server - [Generic CI/CD](https://pentest-tools.com/docs/capabilities/integrations/generic-cicd.md): Integrate security scanning into any CI/CD pipeline - [GitHub Actions](https://pentest-tools.com/docs/capabilities/integrations/github-actions.md): Integrate security scanning into your GitHub Actions workflows - [Jira integration](https://pentest-tools.com/docs/capabilities/integrations/jira.md): Create Jira tickets from security findings - [Microsoft Teams integration](https://pentest-tools.com/docs/capabilities/integrations/microsoft-teams.md): Send security alerts to Microsoft Teams channels - [Nucleus integration](https://pentest-tools.com/docs/capabilities/integrations/nucleus.md): Send security findings to Nucleus for vulnerability management - [Slack integration](https://pentest-tools.com/docs/capabilities/integrations/slack.md): Send security alerts to Slack channels - [Vanta integration](https://pentest-tools.com/docs/capabilities/integrations/vanta.md): Sync security findings to Vanta for compliance monitoring - [Webhooks](https://pentest-tools.com/docs/capabilities/integrations/webhooks.md): Send scan results to custom HTTP endpoints - [Notifications](https://pentest-tools.com/docs/capabilities/notifications.md): Get alerted about scan results based on custom conditions - [Pentest robots](https://pentest-tools.com/docs/capabilities/pentest-robots.md): Automate multi-tool security testing workflows - [Branded reports & email settings](https://pentest-tools.com/docs/capabilities/reports/branded-reports.md): Customize reports with your organization's branding and configure email delivery - [Engagements](https://pentest-tools.com/docs/capabilities/reports/engagements.md): Organize your penetration testing work into engagements - [Report templates](https://pentest-tools.com/docs/capabilities/reports/report-templates.md): Customize and manage report templates for consistent deliverables - [Reporting overview](https://pentest-tools.com/docs/capabilities/reports/reporting-overview.md): Generate professional security reports from your scan results - [Teams and roles](https://pentest-tools.com/docs/capabilities/teams-and-roles.md): Collaborate with team members and control access to workspaces and resources - [Cloud](https://pentest-tools.com/docs/capabilities/vpn/cloud.md): Deploy the VPN agent in AWS or Azure cloud environments - [Docker agent](https://pentest-tools.com/docs/capabilities/vpn/docker-agent.md): Deploy the VPN agent as a Docker container for internal network scanning - [Custom OpenVPN](https://pentest-tools.com/docs/capabilities/vpn/openvpn.md): Set up VPN profiles using your own OpenVPN server - [VPN profiles overview](https://pentest-tools.com/docs/capabilities/vpn/overview.md): Scan internal networks securely using VPN profiles and agents - [VPN troubleshooting](https://pentest-tools.com/docs/capabilities/vpn/troubleshooting.md): Diagnose and resolve common VPN agent issues - [Virtual machine](https://pentest-tools.com/docs/capabilities/vpn/virtual-machine.md): Deploy the VPN agent as a virtual machine using VMware, Hyper-V, or VirtualBox - [Wordlists](https://pentest-tools.com/docs/capabilities/wordlists.md): Manage and use custom wordlists for fuzzing and brute-force testing - [Core concepts](https://pentest-tools.com/docs/core-concepts.md): Understand the architecture, workflow, and terminology of Pentest-Tools.com - [Assets](https://pentest-tools.com/docs/core/assets.md): Add, import, and manage assets and targets for your security testing - [Findings overview](https://pentest-tools.com/docs/core/findings/findings.md): View, triage, and manage security findings discovered by your scans - [Finding templates](https://pentest-tools.com/docs/core/findings/templates.md): Create and manage reusable templates for findings to standardize vulnerability documentation - [Authenticated scanning](https://pentest-tools.com/docs/core/scans/authenticated-scanning.md): Configure authentication to test protected areas of your applications - [Follow redirects](https://pentest-tools.com/docs/core/scans/follow-redirects.md): Control how scanning tools handle HTTP redirects before scanning begins - [Port lists](https://pentest-tools.com/docs/core/scans/portlists.md): Reference for the port presets used by scanning tools - [Scan groups](https://pentest-tools.com/docs/core/scans/scan-groups.md): Group multiple scans into one unit and get one aggregated PDF report instead of a separate report per scan - [Scan types](https://pentest-tools.com/docs/core/scans/scan-types-and-depth.md): Understand Light, Deep, and Custom scan types and when to use each - [Scans and statuses](https://pentest-tools.com/docs/core/scans/scans-and-statuses.md): Understand scan lifecycle and status indicators in Pentest-Tools.com - [Scheduled scans](https://pentest-tools.com/docs/core/scans/scheduled-scans.md): Automate your security testing with scheduled and recurring scans - [Source IP addresses](https://pentest-tools.com/docs/core/scans/source-ip-addresses.md): IP addresses used by Pentest-Tools.com scanners, for firewall whitelisting - [Tools](https://pentest-tools.com/docs/core/tools.md): Security tool types, what they produce, and where they fit in your testing workflow - [Workspaces](https://pentest-tools.com/docs/core/workspaces.md): Organize your security testing by project, client, or engagement using workspaces - [Pentest-Tools.com documentation hub](https://pentest-tools.com/docs/index.md): Build scalable offensive security workflows with Pentest-Tools.com. Get the tech specs for accurate, low-noise pentests and vulnerability assessments - [API Scanner](https://pentest-tools.com/docs/tools/api-scanner.md): Security testing for REST and GraphQL APIs - [Cloud Scanner](https://pentest-tools.com/docs/tools/cloud-scanner.md): Discover misconfigurations and vulnerabilities in cloud storage and services - [Domain Finder](https://pentest-tools.com/docs/tools/domain-finder.md): Discover domain names owned by a company and map its attack surface - [Drupal Scanner](https://pentest-tools.com/docs/tools/drupal-scanner.md): Security testing for Drupal websites - [Google Hacking](https://pentest-tools.com/docs/tools/google-hacking.md): Find exposed data and security issues using Google dorks - [HTTP Request Logger](https://pentest-tools.com/docs/tools/http-request-logger.md): Capture HTTP callbacks for out-of-band vulnerability testing - [ICMP Ping](https://pentest-tools.com/docs/tools/icmp-ping.md): Test host reachability using ICMP echo requests - [Tools overview](https://pentest-tools.com/docs/tools/index.md): Security testing tools available in Pentest-Tools.com - [Joomla Scanner](https://pentest-tools.com/docs/tools/joomla-scanner.md): Security testing for Joomla websites using JoomlaVS - [Kubernetes Scanner](https://pentest-tools.com/docs/tools/kubernetes-scanner.md): Find misconfigurations and vulnerabilities in Kubernetes clusters - [Network Scanner](https://pentest-tools.com/docs/tools/network-scanner.md): Discover vulnerabilities in network infrastructure and services - [Password Auditor](https://pentest-tools.com/docs/tools/password-auditor.md): Test for weak and default credentials on network services and web applications - [People Hunter](https://pentest-tools.com/docs/tools/people-hunter.md): Discover email addresses and social media profiles associated with a target - [Port Scanner](https://pentest-tools.com/docs/tools/port-scanner.md): Discover open TCP and UDP ports and running services on target hosts - [SharePoint Scanner](https://pentest-tools.com/docs/tools/sharepoint-scanner.md): Security testing for Microsoft SharePoint deployments - [Sniper: Auto-Exploiter](https://pentest-tools.com/docs/tools/sniper.md): Automatically exploit known vulnerabilities and extract evidence from compromised systems - [SQLi Exploiter](https://pentest-tools.com/docs/tools/sqli-exploiter.md): Exploit SQL injection vulnerabilities and extract database contents using SQLMap - [SSL/TLS Scanner](https://pentest-tools.com/docs/tools/ssl-tls-scanner.md): Analyze SSL/TLS configuration and detect certificate and protocol vulnerabilities - [Subdomain Finder](https://pentest-tools.com/docs/tools/subdomain-finder.md): Discover subdomains and determine the attack surface of an organization - [Subdomain Takeover](https://pentest-tools.com/docs/tools/subdomain-takeover.md): Detect subdomains vulnerable to takeover attacks - [URL Fuzzer](https://pentest-tools.com/docs/tools/url-fuzzer.md): Discover hidden files, directories, and endpoints on web servers - [Virtual Hosts Finder](https://pentest-tools.com/docs/tools/virtual-hosts-finder.md): Discover virtual hosts configured on a given IP address - [WAF Detector](https://pentest-tools.com/docs/tools/waf-detector.md): Identify web application firewalls protecting target websites - [Website Recon](https://pentest-tools.com/docs/tools/website-recon.md): Identify technologies running on any web application - [Website Scanner](https://pentest-tools.com/docs/tools/website-scanner.md): Web application security testing with active and passive vulnerability detection - [WHOIS Lookup](https://pentest-tools.com/docs/tools/whois.md): Look up domain registration and IP ownership information - [WordPress Scanner](https://pentest-tools.com/docs/tools/wordpress-scanner.md): Security testing for WordPress websites using WPScan - [XSS Exploiter](https://pentest-tools.com/docs/tools/xss-exploiter.md): Capture and analyze cross-site scripting payload executions ## OpenAPI Specs - [api-schema](https://app.pentest-tools.com/api-schema.yml)