Platform Capabilities

Modular Offensive Security. One Verification-First Architecture.

Pentesterra combines vulnerability management, attack surface mapping, breach simulation, and controlled exploitation into one continuous workflow with evidence-first prioritization.

Core Modules

Coverage across infrastructure, applications, and offensive validation operations.

VM

Vulnerability Management

Continuous detection, prioritization, and lifecycle management across the asset inventory.

ANPT

Automated Network Pentesting

Controlled exploit validation for internal and external exposure with operational guardrails.

BAS

Breach & Attack Simulation

Scenario-driven simulation to validate control effectiveness and identify realistic attack paths.

WEB

Web App Pentest

SPA/API-focused testing with authenticated flows, token handling, and controlled payload strategy.

Detailed Capabilities

Agentless & Passive Recon

mDNS, ARP, header analysis, traffic fingerprints — quickly map local networks without endpoints.

Port & Service Discovery

Fast, accurate service detection, versioning and vuln fingerprinting.

MS Active Directory Testing

Automated AD enumeration, ACL analysis, credential abuse simulation, and safe lateral movement validation.

Automated Attack Path Calculation

Graph-based attack-path calculation, prioritized by exploitability and business impact.

Safe Exploit Validation

Uses real-world tools in non-malicious modes to validate true exploitability (no malware/ransomware). GOV customers may enable additional toolsets under contract.

Web Pentesting

Modern web, SPA, API testing via public/private proxies and Tor; support for authentication flows, CSRF, JWT, WAF evasion.

Advanced Evasion

Adaptive probe strategies when WAF/IDS is detected — stealthier payloads & timing adjustments.

Scope Controls & RBAC

Define scan scope, approval gates, and role-based access control to functions and data.

Scanner Access Control

Separate access for scanner nodes; limit who can run, view, or configure nodes.

Prioritization & Risk Scoring

Vulnerability ranking, business-context tagging, and remediation guidance.

NO external tools required

The platform includes required scanning & exploitation capabilities — no third-party procurement needed.

Continuous KB

Auto-updating database of vulnerabilities, CVEs, exploits, and threat intelligence.

Architecture & Operating Modes

Cloud control plane with distributed scanner nodes across external, internal, and on-prem zones.

  • Self-Service SaaS — full operator control for security teams.
  • Managed Service — expert-led engagements through the same platform workflows.
  • Single-Tenant / GOV — sovereign deployments, air-gap options, and strict segmentation.
  • MSSP Mode — multi-tenant operations with per-client isolation and governance boundaries.

Licensing Matrix

Compare availability by module and deployment tier.

Feature / TierVMANPTBASWeb pentestingMSSPGOV
Cloud coreIncludedIncludedIncludedIncludedIncludedIncluded
Network scanningIncludedIncludedNot includedIncludedIncludedIncluded
Passive reconnaissanceIncludedIncludedNot includedIncludedIncludedIncluded
AD scanningIncludedIncludedNot includedNot includedIncludedIncluded
Network pentestingNot includedIncludedNot includedNot includedIncludedIncluded
Web scanning & pentestingNot includedNot includedNot includedIncludedIncludedIncluded
Automated exploitationNot includedIncludedNot includedIncludedIncludedIncluded
Breach attack simulationNot includedNot includedIncludedIncludedIncludedIncluded
On-prem scannersIncludedIncludedIncludedIncludedIncludedIncluded
Cloud scannersIncludedIncludedIncludedIncludedIncludedIncluded
Verifiy vulnerabilityNot includedIncludedNot includedIncludedIncludedIncluded
Managed service optionIncludedIncludedIncludedIncludedIncludedIncluded
Emhanced avoid protectionNot includedNot includedNot includedNot includedNot includedIncluded
Full air-gap supportNot includedNot includedNot includedNot includedNot includedIncluded
Full on-prem installationNot includedNot includedNot includedNot includedNot includedIncluded
Support 24x7IncludedIncludedIncludedIncludedIncludedIncluded

FAQ

Can Pentesterra operate in air-gapped or sovereign environments?

Yes. The GOV Edition supports full air-gap deployment, compliance packaging, and optional on-prem orchestration with controlled update channels.

How do managed pentests work alongside automation?

Our red-team analysts operate through the same platform, layering expert-led engagements on top of automated discovery, exploit validation, and reporting.

Is there an API for integrating findings into existing workflows?

Pentesterra offers REST APIs, webhooks, ticketing integrations (Jira/ServiceNow), and SIEM export to keep remediation and SOC workflows synchronized.

Take Control of Your Attack Surface.