Autonomous AI pentesting that finds bugs, chains them, and proves them safely. Runs on your machine. Nothing leaves your box.
Burp, Nessus, and Nuclei give you a flat list of issues. We connect them into multi-step attack paths, score every chain, and validate each step with a safe proof-of-concept.
Nodes, edges, proof-of-concept per step. No more copy-pasting between tools.
Recon, exploit, chain, validate, report. Fully auditable. Human approval at every risky step.
MCP server exposing 32 tools to any AI client. 11 specialist agents wrap 191 security tools, share recon context, and stamp every finding with a CVSS v3.1 score and a validated PoC.
nmap · nuclei · ffuf · sqlmap · trivy · kube-hunter · BloodHound · impacket · and 183 more, all via one MCP endpoint.
Each agent streams findings to the shared engagement graph. No duplicate work, no lost signal.
Six battle-tested attack paths, rotating live:
Non-destructive reproducers, captured HAR, screenshot, request/response trace. False positives get filtered before your report.
Drop pentest-ai into GitHub Actions. Breaks the build on severity gate. Posts findings as PR comments.
Auto-generates Sigma, Splunk SPL, and KQL for every offensive technique used during the engagement.
Prompt injection, training-data leakage, insecure output, model DoS, covered as first-class assessment targets.
Your engagement never leaves your machine. MIT licensed. Self-hosted. Deterministic.
Free OSS for individuals. Enterprise dashboard for teams. Managed Assessment delivered.
--scope to constrain targets. The bug-bounty preset auto-prunes out-of-scope hosts, disables destructive modules, and formats findings to match most program templates.--auto at your own risk for sandboxed targets.PTAI_MODEL=ollama/llama3 or similar.pip install ptai, pipx install ptai, or uvx ptai. Python 3.10 or newer.[email protected] for Enterprise and Managed customers. Enterprise includes a dedicated Slack channel and a 24h response SLA during business hours.Open source. Run it locally. Own your data.