Support Center
https://pentest-tools.com/
Contact us
Tools and Scans
Getting Started
First Steps
Tips & Tricks
Assets, Targets & Workspaces
Assets & Targets
Workspaces
Tools and Scans
Frequently Asked Questions (FAQ)
Reconnaissance
Web Application Testing
Network Infrastructure Testing
Offensive Tools
Authenticated Scanning
Reporting and Vulnerability Management
Findings
Reporting
Attack Surface
Notifications
Integrations
VPN Profiles
Automation
Scheduler
Pentest Robots
Scan Templates
Account and Billing
Billing and Payment
Account Management
Data Security
Change Log
Back to home
Support Center
Tools and Scans
Getting Started
First Steps
Tips & Tricks
Assets, Targets & Workspaces
Assets & Targets
Workspaces
Tools and Scans
Frequently Asked Questions (FAQ)
Reconnaissance
Web Application Testing
Network Infrastructure Testing
Offensive Tools
Authenticated Scanning
Reporting and Vulnerability Management
Findings
Reporting
Attack Surface
Notifications
Integrations
VPN Profiles
Automation
Scheduler
Pentest Robots
Scan Templates
Account and Billing
Billing and Payment
Account Management
Data Security
Change Log
Tools and Scans
Technical documentation, guides and FAQs related to our tools and scanners.
Frequently Asked Questions (FAQ)
Stop scan doesn’t work
Can’t find a scan
Will the tests overload my server?
How long does a scan take?
Managing your scans
What are deprecated tools on Pentest-Tools.com?
How we detect Log4Shell & find vulnerable Log4j versions
Website is not Accessible
See more
Reconnaissance
Can you find all subdomains?
Google Hacking isn’t working
Web Application Testing
How to configure the Website Scanner
What tests are performed by Website Scanner?
SAST vs DAST
Target URL is not accessible. Please try a different URL.
Can’t perform authenticated website scan
Risks in performing a deep website scan
Can all OWASP Top 10 Web Application Security Risks be detected by automatic scanners?
Target URL is out of scope
See more
Network Infrastructure Testing
Scanner didn’t find any open ports
Which ports are included in the default TCP and UDP port lists?
How to set up the Network Scan port range?
How to scan a subnet or IP range
How to Perform Internal Network Scanning
How do we determine if a host is alive?
How to configure the Network Vulnerability Scanner
How to configure the Port Scanner
See more
Offensive Tools
How to use XSS Exploiter
Authenticated Scanning
How to perform Automatic Authentication with Website Scanner
How to setup Recorded Authentication with Selenium
How to perform Cookie Authentication with Website Scanner
How to get the Session Cookie
How to perform Headers Authentication with Website Scanner
How to perform Authenticated Website Scan with JWT
How to run Sniper authenticated scans
See more