Don't waste your time installing, configuring and running complex security tools. We have them all setup for you, just say what is your target and press the Start button. You will receive a friendly report containing detailed vulnerability information, including risk description, evidence and recommendations for improvement.
Continuous security monitoring
All the scanners from our platform can be scheduled to periodically test your systems for vulnerabilities. Since our tools are regularly updated, you can be sure that you don't miss critical vulnerabilities. The scan reports are sent directly to your inbox so you can quickly react when issues are found.
Discover the attack surface and do passive scans
Information gathering is crucial for planning a penetration test and for estimating the amount of work to be done. We have powerful reconnaissance tools which allow you to quickly discover the attack surface of an organization, passively scan for vulnerabilities and find the most promising targets.
Bypass network restrictions
Even if you have all the tools on your machine, the local firewall of your network might block you from scanning external hosts. The only way around this is to scan from an external server and Pentest-Tools.com was designed just for that. Our servers have a fast and direct Internet connection.
Third-party security evaluations
If you are a web development or an IT services company, you can easily use our platform to show your clients that you have correctly implemented all the necessary security measures. Our results are trusted by more than 50.000 clients in 40+ countries.
Integrate security testing in your own tools
The API that we provide allows you to easily integrate the tools from our platform into your own systems and processes. This way you will benefit of the powerful scanning engines without having the trouble of running such scanners yourself.
Pentest-Tools.com was established in 2013 by a group of experienced penetration testers who needed a reliable online resource to perform security tests from.
The platform has quickly become a reference place for security professionals, system administrators, website developers and other IT specialists who wanted to verify the security of their websites and infrastructure.
"I am amazed how fast your tools are. Continue doing what you guys are doing, you are awesome. I bookmarked your site and it is in my favorites. Have a good day and I hope you will please us again."
Michael T. (Web Hosting Administrator, United States)
"Extremely useful for quick security tests from client site. When you want to check the FW rulebase and you don't have access to the FW itself."
Wynn J. (Security Consultant, United Kingdom)
"This tool worked very well, thank you! It did find a couple of subdomains that I couldn't find with other tools. I was pleasantly surprised because there aren't many quick/easy tools for finding subdomains. The only similar tool I found was at the link below, and it didn't find as many subdomains."
Robert K. (Penetration Tester, Germany)
"Very useful site. I will use it in my Advanced Network Security classes if you don't mind. My job is a lecturer and this fits exactly what I teach. Thank you!"
Paul M. (University Lecturer, France)
Get in touch and send us your requests, feedback, suggestions, complaints or anything else you wish to tell us. If you leave your email address, we will respond as soon as possible.
How do credits work?
As an anonymous user, you get 40 free credits every 24 hours.
Whenever you use one of the tools, its cost in service credits is deducted from your current balance. If your balance runs out, you will get more free credits at the end of the 24-hour period.
If you need more credits per day, you can buy them from our pricing page.