Find out how Pentest-Tools.com platform works, what it can do for your business and what makes it different to other solutions.
You don’t need an account for the Light version of the tools. Go to the tool page and start scanning your systems for vulnerabilities.
You need to whitelist our scanners to prevent the following errors
We count as base targets only the hostname or IP address of the scanned system. All URLs belonging to the same base target will count as a single target.
You can add new targets either from the targets page, by directly scanning them or from the scan results of discovery tools.
The support articles are categorized as follows:
- Getting Started (4 Articles)
Here you will discover some tips to get you started in using the Pentest-Tools.com platform.
- Targets & Workspaces (6 Articles)
Learn more about how to manage your targets and workspaces. These how-to articles will get you through adding, deleting and modifying your targets and workspaces and will also answer the most common questions you may have.
- Scans (6 Articles)
Here you can learn how to run new scans, find out about scan limitations, common scan errors, and how to manage scans from all your workspaces from the /scans page.
- Tools (24 Articles)
Here you will find answers to the most commonly asked questions and errors related to our scanners. To find out more about how they work, see each tool’s dedicated page on our website.
- Vulnerability Management and Reporting (16 Articles)
The vulnerability management feature lets you manage findings from all your scans and create ready-to-go reports, according to your needs. Organize your targets in the Attack Surface View and more.
- Automation (7 Articles)
Learn how to automate your workflows by using templates, scan groups, pentest robots and scan scheduling
- VPN Profiles (2 Articles)
VPN Profiles allow you to run our tools through VPN tunnels in order to reach internal company networks or other protected network segments.
- Account and Billing (12 Articles)
Find answers to the most common questions about Pentest-Tools.com subscriptions and the billing and payment process.
- Data Security (8 Articles)
Data privacy and security is one of our utmost concerns.
This category contains all the necessary information about data security, how and where your data is stored, and more security-related topics.