All the Pentest-Tools.com features you can use right now

Chain and max out the 20+ tools on the platform with the features we’ve built to make them fit into your workflow.

Suitcase illustration

Attack Surface mapping

Automatically created from your scan results, the Attack Surface gives you an in-depth view of your targets’ exposure. It includes all the hosts, ports, services, technologies, etc. for the targets in your current workspace.

Internal scanning

Simulate an attacker with local network access with our dedicated VPN agent. Run any of our security tools through encrypted VPN tunnels and discover vulnerabilities in secluded networks, intranets, private clouds, or restricted-access systems. This feature also lets you route scans through your own servers!

Authenticated scanning

Scan behind login pages in web applications to pinpoint vulnerabilities as an authenticated user. Our Website Vulnerability Scanner offers multiple authentication methods ranging from username/password combinations to custom headers, cookies, and recorded login sessions.

Pentest reporting tool

Pull findings from multiple tools into a pentest report in under 3 minutes, complete with pre-filled executive summary, vulnerability and risk descriptions, and remediation advice. Make your best work replicable with customizable templates for findings, engagements, and reports. When you’re ready, export your report in .DOCX, PDF, HTML, and other formats.

White-label pentest reporting

Send polished penetration test reports customized with your company’s logo directly from your Pentest-Tools.com account. Manage and email reports in multiple formats (DOCX, PDF, HTML) all from one place, effortlessly maintaining a consistent, professional presentation to your clients and partners.

Pentest Robots

Pentest Robots orchestrate multiple tools and perform targeted testing based on strict conditioning that you define. Chain our tools based on your know-how and experience into a pentest robot or use choose from our predefined, ready-to-use pentest robots and get a flow you can automatically run (Scan with Robot) against any of your targets to discover specific types of security issues.

Integrations

Connect external applications and services to Pentest-Tools.com and get the latest, most relevant updates from your scans and other ethical hacking activities. Send results directly to a Jira project, get notifications based on specific triggers through webhooks, and see a scan results digest on your preferred Slack or Microsoft Teams channel. 

Our REST API also helps you integrate our platform with your tools and internal workflows, or even develop your own tools based on our scanning engines.

Team sharing and management

Keep things organized, synchronized, and consistent when using Pentest-Tools.com with your team. From differentiated access rights to clear ownership over tasks, this feature makes it easy for colleagues to work together on the same target and maintain your quality standard.

Scan management: scheduling, templates, bulk scanning

Monitor your systems' security with scheduled scans combined with notifications and scan reports sent to your inbox. Combine multiple tools in scan templates for even wider coverage and deeper results, and use bulk scanning to assess multiple targets at once. This level of automation keeps you in control and also saves you time by erasing a lot of manual work.

Workspaces

Keep your engagements organized with workspaces. Group multiple assets in a specific workspace to ensure all your work pools into a single source of truth. This feature offers the flexibility of moving targets between workspaces, deleting them, and also giving colleagues access to a specific workspace to make collaboration easier.

Wordlists

Use the default wordlists we provide with tools such as our URL Fuzzer, Password Auditor, Subdomain Finder to make DNS Enumeration, fuzzing, or brute-forcing more efficient.

You can also upload your own wordlists (up to 50,000 words) to increase your chances of discovering juicy details about your targets or to gain initial access.