v1.0 | Now Available

From Recon to Exploit.
Fully Automated.

Professional penetration testing framework with 20+ scanning modules, real-time exploitation engine, interactive attack map, and full intercepting proxy. All in one tool.

ptrecon
$ ptrecon --target example.com --full
[*] Starting reconnaissance on example.com...
[*] Running 22 scan modules in parallel
[+] 47 subdomains discovered
[+] Origin IP found: 203.0.113.42 (Cloudflare bypass)
[!] CVE-2021-44228 (Log4Shell) CRITICAL [VERIFIED]
[!] SQL Injection in /api/users?id= HIGH [VERIFIED]
[*] Report saved: report_example_com.html
0
Scanning Modules
0
Built-in Exploits
0
Nuclei Templates
0
WAF Bypass Signatures

Everything You Need.
One Framework.

A unified framework that replaces your entire pentest toolkit. No more switching between a dozen tools.

Automated Recon Engine

DNS enumeration, subdomain discovery, port scanning, web crawling with headless browser rendering, technology fingerprinting.

DNS Subdomains Ports CMS WAF

CVE Detection & POC Engine

Automatic CVE lookup with real proof-of-concept exploitation. 14 built-in attack modules with verified impact assessment.

NVD API OSV.dev Nuclei Log4Shell

Deep Active Scanner

SQL Injection (4 techniques), XSS, SSTI, Command Injection, Path Traversal, SSRF. Includes WAF bypass and attack chain detection.

SQLi XSS SSTI SSRF CMDi

Intercepting Proxy Lab

Full HTTP/HTTPS interception with Repeater, Intruder (4 attack modes), WebSocket capture, passive scanning, and SQLMap integration.

Repeater Intruder WebSocket Proxy

Interactive Attack Map

Visual network topology from domains to IPs. One-click POC execution on any node with built-in post-exploitation panels.

RCE Shell File Browser SQLMap Rev Shell

Professional Reporting

HTML dashboards with charts. JSON, SARIF for GitHub/GitLab Security, and JUnit XML for CI/CD pipeline integration.

HTML SARIF JUnit CI/CD

Three Steps. Full Coverage.

01

Reconnaissance

Automated discovery of subdomains, open ports, technologies, CDN bypass, and attack surface mapping.

02

Detection

CVE identification, vulnerability scanning with 8,000+ Nuclei templates, and deep injection testing.

03

Exploitation

Proof-of-concept execution with verified impact, attack chaining, and professional report generation.

TARGET   example.com
STATUS   ● SCANNING
ORIGIN IP  203.0.113.42 VERIFIED
CDN       Cloudflare → Bypassed
TECH      nginx/1.24 · PHP 8.2 · WordPress 6.4
PORTS     22, 80, 443, 3306, 8080
■ CRITICAL  CVE-2021-44228 Log4Shell
■ HIGH      SQL Injection /api/v2/users
■ MEDIUM    CORS Misconfiguration
■ LOW       Server Version Disclosure
FINDINGS  23 vulnerabilities · 47 subdomains · 6 exploitable

Deep Scan. Real Results.

ptrecon doesn't just find open ports. It fingerprints technologies, bypasses CDNs, discovers the real origin IP, identifies CVEs, and verifies them with real exploitation. One scan. Full coverage.

  • Origin IP discovery through CDN/Cloudflare bypass
  • WAF detection and adaptive evasion (16+ WAFs)
  • Technology-aware payload selection
  • Attack chain detection for combined impact
  • Stealth, Normal, and Aggressive scan profiles
  • Tor routing and rate limiting support

20+ Specialized Scanning Modules

Each module is purpose-built for a specific recon or attack vector. Run them individually or all at once.

recon
DNS, subdomains, ports, headers
crawler
Web spider with form & endpoint discovery
deep_crawler
Headless browser crawling for SPAs
tech
CMS, framework, WAF fingerprinting
data
Sensitive files, PII, API auth leaks
origin
CDN bypass, origin IP discovery
nuclei
8,000+ vulnerability templates
dirbrute
Directory & file brute-force
takeover
Subdomain takeover (45+ services)
ssl
SSL/TLS certificate analysis
api
OpenAPI / Swagger / GraphQL testing
cloud
AWS S3, Azure, GCP, Firebase misconfig
jwt
JWT token analysis and attacks
creds
Default credentials, HIBP checks
active_scan
Deep parameter injection scanner
cve
CVE detection engine (NVD + OSV)
poc
POC exploitation engine
zeroday
Fuzzing, logic flaws, protocol attacks
session
Token entropy & session analysis
plugins
Community extensions & custom POCs

14 Built-in Attack Modules

Real exploitation with verified impact. Not just detection. Each module produces actionable proof.

Module Description Impact
.git ExposedExposed .git directory detectionFull source code access
.env SecretsExposed environment filesDB passwords, API keys
CORS BypassCORS misconfiguration exploitationCross-origin data theft
Open RedirectUnvalidated redirect chainsPhishing attacks
Host InjectionHost header manipulationCache poisoning
Path TraversalDirectory traversal / LFIRead server files
Auth BypassAuthentication bypass vectorsAdmin panel access
SSRFServer-Side Request ForgeryInternal network access
JWT BypassJWT token forgery attacksImpersonate any user
IDORInsecure Direct Object ReferenceAccess other users' data
JS SecretsAPI keys leaked in JavaScriptCloud service compromise
Debug EndpointsExposed debug/admin interfacesFull API schema exposure
CORS ExploitAdvanced CORS exploitationSteal authenticated data
Info LeakVerbose errors and headersTechnology stack exposure

Known CVE Exploits. Built In.

Automatic detection and verified exploitation of critical vulnerabilities.

CVE-2021-44228
Log4Shell
CRITICAL
CVE-2022-22965
Spring4Shell
CRITICAL
CVE-2023-22515
Confluence Auth Bypass
CRITICAL
CVE-2024-3400
PAN-OS Command Injection
CRITICAL
CVE-2023-46747
F5 BIG-IP Auth Bypass
CRITICAL
CVE-2017-5638
Apache Struts RCE
CRITICAL

One Tool. Zero Compromise.

See how ptrecon stacks up against the industry's most popular security tools.

Feature ptrecon Burp Suite Nessus OWASP ZAP
Automated scanning (20+ modules) Limited
CVE detection + POC exploitation Verified No POC
Interactive attack map
Intercepting proxy
Post-exploitation (shell, LFI, SQLi)
WebSocket testing
Headless browser crawling
CI/CD integration (SARIF/JUnit)
WAF bypass engine (16+ WAFs)
Price Free $449/yr $3,590/yr Free

Ready to Test Your Defenses?

Start scanning in under 60 seconds. No setup. No complexity. Just results.