Scanning 24/7 for vulnerabilities
Claude Mythos integration — coming soon

External attack surface management for modern teams

Continuous vulnerability scanning, attack surface intelligence, and self-learning AI analysis. Verification Engine eliminates false positives. Compliance mapping for NIS2, ISO 27001, and OWASP. AI agent ready via MCP — hosted in Sweden.

Free passive security check — no account required

30+ security tools + AI agent readyHosted in Sweden, GDPR compliantContinuous monitoring

Comprehensive attack surface security

Automated vulnerability scanning, external attack surface management, and AI analysis — built and hosted in Sweden.

Vulnerability scanning

Automated daily scans using 30+ professional tools including Nuclei, Nmap, Nikto, and SQLMap. Covers OWASP Top 10, known CVEs, misconfigurations, and exposed services.

Attack surface monitoring

Continuous discovery of subdomains, IP addresses, open ports, and technologies. External attack surface management (EASM) that maps your full exposure.

Multi-pass AI pentest

Every scan runs through a 4-pass AI pipeline: triage, correlation, deep analysis, and executive reporting. Identifies attack chains, lateral movement paths, and generates audit-grade reports with CVSS justification — delivered daily via email and dashboard.

Subdomain takeover protection

Continuous monitoring of 25+ cloud services for dangling DNS records — AWS S3, Azure, GitHub Pages, Heroku, Netlify, Shopify, and more. Instant alerts when a subdomain becomes vulnerable to takeover.

AI agent integration (MCP)

Connect Claude Code, Cursor, Windsurf, or any MCP-compatible AI assistant directly to your security dashboard. Manage targets, trigger scans, and review findings through natural language — your AI agent becomes your security analyst.

Custom scan profiles

Four built-in profiles: Vibecode Audit for AI-built apps, Standard Pentest for thorough testing, Stealth Scan for production systems, and Passive Recon for zero-touch analysis. Create custom profiles for specific needs.

Emerging threat detection

Scan templates auto-update daily with the latest CVEs, zero-days, and novel attack techniques from the security community. AI correlates findings into attack chains and identifies lateral movement paths unique to your infrastructure.

Remote scan nodes

Deploy lightweight scan agents inside your network for internal vulnerability scanning. Outbound-only connections — no inbound firewall rules needed. Docker one-liner deployment with enterprise-grade encryption.

Site monitoring & change detection

Automated daily screenshots and deep content analysis. Self-learning AI baseline detects injected scripts, defacement, removed security headers, and unauthorized changes — not routine content updates.

Compliance mapping (NIS2, ISO 27001, OWASP)

Automatically map scan findings to NIS2 Directive, ISO 27001 Annex A, and OWASP Top 10 controls. See which requirements you meet, which need attention, and track compliance score over time.

Three engines. Zero noise.

Our platform is built around three core engines that work together to deliver verified, actionable findings.

Verification Engine

Self-learning false positive elimination. Cross-references findings across tools, detects SPA catch-all patterns, and improves with every scan cycle. Only real vulnerabilities reach your dashboard.

Context Engine

Maps relationships between discovered assets — subdomains, IPs, technologies, and services. Understands your attack surface topology to prioritize findings by actual reachability and business impact.

Analysis Engine

Autonomous AI agents run a 4-pass analysis pipeline on every scan. Triage, correlation, deep analysis, and executive reporting — producing plain-language reports your team can act on immediately.

How it works

01

Add your targets

Enter your domains and we automatically discover subdomains, open ports, and exposed services across your attack surface.

02

We scan continuously

30+ security tools run daily scans — vulnerability detection, web application testing, SSL analysis, and subdomain takeover checks. Scan templates auto-update with the latest CVEs and zero-days.

03

Get actionable reports

AI analyzes every finding and delivers plain-language reports with prioritized recommendations straight to your inbox.

🔍
Recon
Subdomain discovery, DNS enumeration
1
🌐
Probe
HTTP probing, port scanning, TLS checks
2
🕷️
Crawl
Web crawling, URL discovery, sitemap analysis
3
Scan
Nuclei templates, CVE detection, misconfig checks
4
🔬
Deep
Input validation, fuzzing, auth bypass testing
5
🤖
Verify
AI-powered FP filtering, soft-404 detection
6
REST API

Built for automation and AI agents

Integrate vulnerability scanning into your CI/CD pipeline or connect your AI assistant via MCP. Queue on-demand scans, retrieve findings, manage targets programmatically, or let your AI agent handle it through natural language.

curl -H "Authorization: Bearer ps_live_..." \
  https://pentesting.se/api/v1/scans \
  -d '{"target": "example.com",
       "profile": "standard"}'

Continuous site monitoring

Detect unauthorized changes to your websites before your customers do. Our AI learns what normal looks like and alerts you when something suspicious appears.

Daily screenshots & full DOM analysis

AI baseline learning filters noise from real threats

Instant alerts via email or webhook

Tracks scripts, headers, forms, meta tags & more

Vibecode

Basic

AI-generated app vulnerabilities

ReconDeep

Standard

Standard

Full web application security

ReconDeep

Stealth

Premium

WAF evasion, low-noise scanning

ReconDeep

Passive

Premium

Zero-touch reconnaissance

ReconDeep

Pricing

All plans include daily scanning and AI-powered reports.

Basic

249 SEK/month~25 EUR
  • 1 target
  • Daily vulnerability scans
  • AI reports via email
  • Vibecode audit profile
  • Email support
Get started
Popular

Standard

990 SEK/month~95 EUR
  • Up to 5 targets
  • Daily scans + EASM
  • Full dashboard + REST API + MCP
  • All scan profiles
  • Attack surface intelligence
  • Site monitoring
  • Certificate inventory
  • Compliance dashboard
  • Slack + webhook alerts
  • Priority support
  • PDF reports
Get started

Premium

Contact us
  • Unlimited targets
  • Continuous scanning + EASM
  • Full dashboard + REST API + MCP
  • All profiles + custom
  • Attack surface intelligence
  • Site monitoring + policies
  • Certificate inventory
  • Compliance (NIS2/ISO/OWASP)
  • Breach monitoring (HIBP)
  • Distributed scan agents
  • Subdomain takeover monitoring
  • Manual penetration testing
  • Dedicated support + SLA
Contact us

How we compare

ServiceDaily scansAI reportsSwedishEASMProfilesSite monitoringPrice
Pentesting.seFrom 249 SEK
DetectifyFrom $275/mo
IntruderFrom $172/mo
Pentest-ToolsFrom $85/mo
QualysCustom

Frequently asked questions

What types of vulnerabilities do you detect?
Our platform runs 30+ security tools covering OWASP Top 10, known CVEs, misconfigurations, exposed services, subdomain takeover risks, SSL issues, and web application vulnerabilities. Scan templates auto-update daily with the latest CVEs and zero-day exploits.
Is my data stored in Sweden?
Yes. All data including scan results, findings, and reports is stored on servers located in Sweden operated by Adminor AB. No personal data is transferred outside the EU/EEA. We are fully GDPR compliant.
How does the AI-powered reporting work?
Every scan runs through a 4-pass AI pipeline: triage, correlation, deep analysis, and executive reporting. The AI identifies attack chains, correlates findings across tools, assigns CVSS scores with justification, and delivers plain-language reports to your inbox.
Can I integrate scanning into my CI/CD pipeline?
Yes. Our full REST API lets you queue on-demand scans, retrieve findings, and manage targets programmatically. Trigger scans on deployment, fail builds on critical findings, or pull results into your SIEM.
What is attack surface monitoring (EASM)?
External Attack Surface Management continuously discovers your publicly exposed assets — subdomains, IP addresses, open ports, technologies, and cloud resources. It maps your full exposure and detects changes like new subdomains or dangling DNS records that could be exploited.
Do you offer manual penetration testing?
Yes. Premium plan includes manual penetration testing by experienced security professionals in addition to automated scanning. Contact us for a custom engagement scope.

Secure your external attack surface

Start a free trial — no credit card required.