◆ Automated Pentest Suite

Network Security
Testing, Automated.

Run comprehensive penetration tests from a single command. Discover vulnerabilities, score risk, map compliance — and generate boardroom-ready reports in minutes.

PentestToolkit Agent

50+

Vulnerability Checks

0–10

Risk Scoring Engine

3

Compliance Frameworks

<5 min

Scan to Report

Everything You Need in One Toolkit

From network discovery to compliance mapping — PentestToolkit handles the entire pentest workflow so you can focus on remediation.

🔍

Network Discovery

Automated ARP and Nmap scanning to discover every host, open port, and running service across your target CIDR range.

⚠️

Vulnerability Detection

Deep service interrogation including OS fingerprinting, SSL/TLS analysis, web server enumeration, and known CVE detection.

📈

Risk Scoring (0–10)

Proprietary CVSS-weighted scoring algorithm that factors in service criticality, exposure, and vulnerability severity for actionable risk ratings.

📋

Compliance Mapping

Automatically map findings against PCI DSS, NIST CSF, and CIS Controls frameworks. Know your compliance gaps instantly.

📊

Interactive Dashboard

Beautiful HTML dashboard with charts, risk breakdowns, and drill-down details. Perfect for stakeholder presentations and audits.

🔒

Hardware-Bound Licensing

Enterprise-grade license enforcement with EdDSA-signed JWT tokens bound to your hardware ID. Secure, tamper-proof, and auditable.

Three Steps. Full Coverage.

PentestToolkit orchestrates the entire penetration testing pipeline from a single command.

1

Define Your Target

Pass a CIDR range or single IP to the master orchestrator and let the toolkit handle the rest.

2

Automated Scanning

The Bash engine runs host discovery, port scanning, service identification, and vulnerability checks in parallel.

3

Report & Score

The Python engine parses results, calculates risk scores, maps compliance, and generates your dashboard and report.

One Command.
Complete Insight.

Run a full penetration test from your terminal. PentestToolkit handles scanning, analysis, and reporting — all from a single invocation.

  • Host discovery via ARP + Nmap ping sweep
  • Service versioning and OS fingerprinting
  • SSL certificate and cipher analysis
  • Automated risk scoring per host
  • Compliance gap identification
  • HTML dashboard + Markdown report output
terminal
# Launch a full pentest scan $ sudo ./run_full_scan.sh 192.168.1.0/24 [*] Starting PentestToolkit v1.0 [*] License validated ✓ [*] Target: 192.168.1.0/24 [+] Phase 1: Host Discovery... Found 14 live hosts [+] Phase 2: Service Scanning... Scanning ports on 14 hosts... [+] Phase 3: Vulnerability Analysis... [!] 3 critical findings detected [+] Phase 4: Report Generation → dashboard.html → report.md [✓] Scan complete. Risk Score: 7.2/10

Reports That Speak for Themselves

Every scan produces an interactive dashboard and a detailed Markdown report with risk scores and compliance mapping.

📈 Risk Score Breakdown

7.2 / 10 — High Risk

Based on CVSS weights, service criticality, and vulnerability exposure across 14 discovered hosts.

📋 Compliance Status

Findings automatically mapped to industry frameworks:

PCI DSS 3.2 — 8/11 Pass NIST CSF — 6/9 Pass CIS Controls — 10/12 Pass

Detailed remediation guidance included for each failing control.

Simple, Transparent Pricing

Choose the license that fits your engagement size. All licenses are hardware-bound and include full toolkit access.

Starter

For individual assessors

$99/license

One-time purchase

  • 25 scan executions
  • Single machine binding
  • Full scan + reports
  • 90-day validity
Get Starter

Enterprise

For organizations

Custom

Contact for quote

  • Unlimited executions
  • Multi-machine deployment
  • Priority support
  • Custom validity period
Contact Sales
PentestToolkit

Ready to Secure Your Network?

Get started with PentestToolkit today. Run your first scan in under five minutes.