Saving...
Toggle navigation
PenTest.WS
Features
Pricing
Videos
News
Store
Support
Documentation
Contact
JOIN
LOGIN
Built for Penetration Testers
assignment
Engagements
Your security assessment starts by creating an Engagement in PenTest.WS
dns
Hosts
IP address, fully qualified domain name, or computer name, Hosts are your Engagement's targets
settings_ethernet
Services
TCP/UDP ports are the services found during your penetration test, imported from Nmap/Masscan XML or added manually
sensors
Scan Templates
Customizable Nmap commands including your target's IP address or CIDR range, port numbers and all the command line switches you need
import_export
Import Nmap XML
Capture hundreds of hosts & thousands of services from one simple & quick Nmap or Masscan XML file import
api
API
Access to your Engagements, Hosts, Ports and other PTWS objects through a RESTful architecture to automate your penetration testing tasks
PenTesting Hosts & Services
post_add
Note Pages
Create Engagement, Host, or Port note pages for Discovered URLs, Possible Vulnerabilities, Command Output or anything else you need
list
Service Command Library
Create a global list of your favorite attack commands for each service and never again stumble with dozens of command line switches
POPULAR
language
Global Service Notes
GSN are tied to a service such as HTTP/SSH/SMB. When you encounter that service again, your notes are automatically available
checklist
Default Service Checklist
Your routine ToDo list for services
HTTP? Check robots.txt
FTP? Check anonymous access
SMB? Check null access
... as many as you need
subtitles
Scratchpad Editor
Code editing with syntax highlighting for over 150 programming languages, including a hierarchical file structure
receipt
Write-Ups
The perfect place to capture screen shots, code snippets and exploit steps during your engagement
Views & Filtering
dashboard
Boards
Most of us are familiar with Boards style organization. These boards are user-defined for each Engagement and can contain any number of hosts.
grid_on
The Matrix
Your 10,000 foot view of your Engagement, by Host & Port. Filter by OS, Type, Flags, Port Number/State/Status and more.
alt_route
Subnetting
Breakdown a large engagement, maintain scope, and focus on individual segments of a target network
Findings
flag
Findings Library
A company-wide list of templates for vulnerabilities such as SQL Injection including generic text for background, description, impact, recommendations, as well as a default risk level and reference links.
sports_score
Engagement Findings
During a security assessment, templates from your Findings Library can quickly be added to the Engagement in real-time as you discover them. Further refinements can then be captured with unique details about each specific finding.
Clients & Reporting
manage_accounts
Clients Manager
A list of your company's clients and their details for use in reporting templates, such as {client.name} and {client.shortName}
summarize
Reporting Templates
Your DOCX files, as templates! Variables, For loops, If statements, and HTML content from your Findings with embedded images such as screenshots
room_service
Generate Deliverables
Processes your DOCX Reporting Templates with embedded {tags} to generate fully customized reporting documents with a single click
Collaboration
Community Repository
Hobby Tier members and above can access the PenTest.WS Community Repository where you'll find command templates for your General Command Library as well as your Service Command Library. Search by keyword, service, operating system or category. Then simply click Import to bring these commands into your own account and start using them immediately.
NEW
group_add
User Maintenance
Add, Edit & Delete users with PenTest.WS Pro Tier
groups
Shared Engagements
Teams of penetration testers can now collaborate with PenTest.WS Pro. All Shared Engagement details are synchronized in real-time between users, even across the globe. Fields are temporarily locked while being edited and updated as data is saved to the server. Pop-up notifications are displayed about important events, such as adding/delete hosts, ports, credentials or findings.
supervisor_account
Access Control
The Engagement owner can grant Read Only or Full Access to teammates on an individual basis
Integration
email
SMTP
Forgot your password? Want to send a new user welcome message with a temporary password? PTWS can integrate with outgoing SMTP services
login
LDAP
Connect PenTest.WS Pro to your Active Directory environment over LDAP for federated authentication
screen_lock_portrait
Two-Factor
Use Google Authenticator to further secure your PenTest.WS account with Two-Factor Authentication (2FA)
Additional Tools
chat_bubble
Echo Up
Sometimes a reverse shell is so limited, to create a remote file the only option is to use echo and output redireciton
science
CyberChef
Called "The Cyber Swiss Army Knife" this popular tool is included directly within PenTest.WS
hardware
MSF Venom Builder
Select from a list of payloads/encoders/platforms/formats. Filter the list of payloads using word fragments in any order
General Libraries
code
Shells Library
Need a reverse shell? Manage your list of shell commands with copy-and-paste integration
tag
Commands Library
A place to store all your frequently used, and not so frequently used, general system commands
POPULAR
text_snippet
Notes Library
Code editing with syntax highlighting for over 150 programming languages, including a hierarchical file structure
bookmark_border
Bookmarks Library
Add notes & assign keywords to Bookmarks for easy retrieval using filters, sort and search
Search
verified
CVE DB
The Common Vulnerabilities and Exposure (CVE) Database is included in PenTest.WS
bug_report
Exploit-DB
Easily search the Exploit-DB from within the PenTest.WS platform
visibility
Nmap Scripts
Looking for a list of Nmap scripts to investigate a SIP port? Nmap script database in built-in
integration_instructions
Metasploit Modules
Metasploit Modules are incredibly powerful and finding the right one can be tricky. Use PTWS's Metasploit search tool using simple keywords, and click a link to launch the module in your terminal.
search
Keyword Search
Use PenTest.WS's Keyword Search tool to instantly dig through past Engagements and find those notes you have but can't remember where you left them
Join Now for Free!