Continuous security validation

We see what you can't

Your organization's attack surface from the outside. 30+ tools, AI analysis, verified findings. Not just a vulnerability list — we prove what's actually exploitable.

30+

Security tools

< 0.1%

False positive rate

4-pass

AI verification

Trust, but verify.
Swedish-hosted, GDPRNIS2 + ISO 27001Since 1983

Comprehensive attack surface security

Automated vulnerability scanning, external attack surface management, and AI analysis — built and hosted in Sweden.

Vulnerability scanning

Automated daily scans using 30+ professional tools including Nuclei, Nmap, Nikto, and SQLMap. Covers OWASP Top 10, known CVEs, misconfigurations, and exposed services.

Attack surface monitoring

Continuous discovery of subdomains, IP addresses, open ports, and technologies. External attack surface management (EASM) that maps your full exposure.

Multi-pass AI pentest

Every scan runs through a 4-pass AI pipeline: triage, correlation, deep analysis, and executive reporting. Identifies attack chains, lateral movement paths, and generates audit-grade reports with CVSS justification — delivered daily via email and dashboard.

Emerging threat detection

Scan templates auto-update daily with the latest CVEs, zero-days, and novel attack techniques from the security community. AI correlates findings into attack chains and identifies lateral movement paths unique to your infrastructure.

Subdomain takeover protection

Continuous monitoring of 25+ cloud services for dangling DNS records — AWS S3, Azure, GitHub Pages, Heroku, Netlify, Shopify, and more. Instant alerts when a subdomain becomes vulnerable to takeover.

AI agent integration (MCP)

Connect Claude Code, Cursor, Windsurf, or any MCP-compatible AI assistant directly to your security dashboard. Manage targets, trigger scans, and review findings through natural language — your AI agent becomes your security analyst.

Custom scan profiles

Four built-in profiles: Vibecode Audit for AI-built apps, Standard Pentest for thorough testing, Stealth Scan for production systems, and Passive Recon for zero-touch analysis. Create custom profiles for specific needs.

Remote scan nodes

Deploy lightweight scan agents inside your network for internal vulnerability scanning. Outbound-only connections — no inbound firewall rules needed. Docker one-liner deployment with enterprise-grade encryption.

Site monitoring & change detection

Automated daily screenshots and deep content analysis. Self-learning AI baseline detects injected scripts, defacement, removed security headers, and unauthorized changes — not routine content updates.

How it works

1.

Add your targets

Enter your domains and we automatically discover subdomains, open ports, and exposed services across your attack surface.

2.

We scan continuously

30+ security tools run daily scans — vulnerability detection, web application testing, SSL analysis, and subdomain takeover checks. Scan templates auto-update with the latest CVEs and zero-days.

3.

Get actionable reports

AI analyzes every finding and delivers plain-language reports with prioritized recommendations straight to your inbox.

🔍
Recon
Subdomain discovery, DNS enumeration
1
🌐
Probe
HTTP probing, port scanning, TLS checks
2
🕷️
Crawl
Web crawling, URL discovery, sitemap analysis
3
Scan
Nuclei templates, CVE detection, misconfig checks
4
🔬
Deep
Input validation, fuzzing, auth bypass testing
5
🤖
Verify
AI-powered FP filtering, soft-404 detection
6

Built for automation and AI agents

Integrate vulnerability scanning into your CI/CD pipeline or connect your AI assistant via MCP. Queue on-demand scans, retrieve findings, manage targets programmatically, or let your AI agent handle it through natural language.

curl -H "Authorization: Bearer ps_live_..." \
  https://pentesting.se/api/v1/scans \
  -d '{"target": "example.com",
       "profile": "standard"}'

Continuous site monitoring

Detect unauthorized changes to your websites before your customers do. Our AI learns what normal looks like and alerts you when something suspicious appears.

  • Daily screenshots & full DOM analysis
  • AI baseline learning filters noise from real threats
  • Instant alerts via email or webhook
  • Tracks scripts, headers, forms, meta tags & more
shop.example.com
06:00noneNo changes detected
06:00infoCDN header rotation (baseline)
06:00warningNew external script from unknown domain
Alert sent via webhook

Vibecode

Basic

AI-generated app vulnerabilities

ReconDeep

Standard

Standard

Full web application security

ReconDeep

Stealth

Premium

WAF evasion, low-noise scanning

ReconDeep

Passive

Premium

Zero-touch reconnaissance

ReconDeep

Pricing

All plans include daily scanning and AI-powered reports.

Zero findings = money back. If your first scan finds no vulnerabilities, we refund your first month.

Basic

249 SEK/month~25 EUR
  • 1 target
  • Daily vulnerability scans
  • AI reports via email
  • Vibecode audit profile
  • Email support
Get started

Standard

Popular
990 SEK/month~95 EUR
  • Up to 5 targets
  • Daily scans + EASM
  • Full dashboard + REST API + MCP
  • All scan profiles
  • Attack surface intelligence
  • Site monitoring
  • Certificate inventory
  • Compliance dashboard
  • Slack + webhook alerts
  • Priority support
  • PDF reports
Get started

Premium

Contact us
  • Unlimited targets
  • Continuous scanning + EASM
  • Full dashboard + REST API + MCP
  • All profiles + custom
  • Attack surface intelligence
  • Site monitoring + policies
  • Certificate inventory
  • Compliance (NIS2/ISO/OWASP)
  • Breach monitoring (HIBP)
  • Distributed scan agents
  • Subdomain takeover monitoring
  • Manual penetration testing
  • Dedicated support + SLA
Contact us

How we compare

ServiceDaily scansAI reportsSwedishEASMProfilesSite monitoringPrice
Pentesting.seFrom 249 SEK
AikidoFrom €300/mo
DetectifyFrom $275/mo
IntruderFrom $172/mo
Pentest-ToolsFrom $85/mo
QualysCustom

Frequently Asked Questions

What is external attack surface management (EASM)?

EASM continuously maps and monitors your organization's externally exposed IT assets — domains, subdomains, IPs, ports, web applications, and cloud services — to find vulnerabilities before attackers do.

How is pentesting.se different from a regular vulnerability scanner?

We combine 30+ security tools with a self-learning Verification Engine that eliminates false positives. The result is actionable reports — not hundreds of unfiltered alerts. Plus: continuous monitoring, AI analysis, and compliance mapping included.

Which compliance frameworks are supported?

We automatically map findings to the NIS2 Directive, ISO 27001 Annex A, and OWASP Top 10. Compliance reports can be generated directly from the dashboard.

Can I integrate with CI/CD and AI tools?

Yes. We offer a REST API, Prometheus metrics, and an MCP server (Model Context Protocol) that works with Claude Code, Cursor, and other AI assistants. Trigger scans and fetch results automatically.

Where is data stored?

All data is stored on servers in Sweden. No US Cloud Act exposure. Full GDPR compliance.

Secure your external attack surface

Start a free trial — no credit card required.

Adminor AB — Swedish IT infrastructure & security since 1983