Live · v0.10.1 · Open source
Find it.
Chain it.
Prove it.
An autonomous pentesting CLI that maps your attack surface, validates every finding with a safe proof of concept, and chains the results into multi-step attack paths.
1247 chains traced this week
·
8.4k CVEs in pipeline
Scroll to begin
0tools
0specialist agents
0mcp tools
SARIF+ ci/cd
MITlicensed
01 / 03 · Attack surface
It maps your attack surface.
Subdomain enumeration, port discovery, fingerprinting, JS analysis. Then it stops noisy scans and decides what to chase next, guided by twelve specialist agents that share context.
The difference
Scanners flag.
We weaponize.
Scanner output47 findings · flat
med/api/proxy?url= · external fetch
medIMDSv1 metadata reachable
lowIAM node-role over-privileged
medsecrets readable in prod ns
pentest-ai chaincritical · 9.8
01SSRF on /api/proxy?url=
02→ IMDSv1 · STS creds
03→ assume node role · eks-node
04→ aws-auth · cluster-admin