Automated Pentesting Platform

Your AI Red Team.Always Hunting.

AI-driven offensive security platform for recon, exploit intelligence, engagement orchestration, autonomous remediation, and pentest reporting, with an MCP server that lets your AI assistant run the workflow.

35MCP Tools
8Offensive Agents
4Exploit Sources
2Optional Sidecars

Manual Pentesting Does Not Scale

Traditional penetration testing is slow, expensive, and inconsistent across engagements

Incomplete Coverage

Manual testers miss attack paths. No systematic way to enumerate every target across your infrastructure.

Slow Turnaround

Weeks between engagement start and final report. Findings are stale before they reach your team.

Inconsistent Quality

Results depend on the individual tester. No standardized methodology across engagements.

Offensive Intelligence, Automated

Eight specialized AI agents drive reconnaissance, exploit review, reporting, remediation, and incident response across every engagement

Recon Agent

Automated target enumeration discovers services, technology stacks, and entry points that manual reconnaissance would miss.

ReconnaissanceAnalysisLogic Review

Exploit Agent

AI selects exploits using the integrated exploit database — Exploit-DB, Metasploit modules, GitHub PoCs, and InTheWild active exploitation data. Generates and validates PoCs enriched with real-world exploit intelligence.

Exploits FoundValidated PoCsRisk Score

Pivot Agent

Plans exploit progression, shapes project-specific Semgrep coverage, and helps operators move from raw findings to validated attack paths.

AnalyzeImplementVerifyFix

Report Agent

Generate comprehensive pentest reports with executive summaries, attack narratives, risk assessments, and prioritized remediation guidance.

PDFMarkdownEmail Delivery

Your AI Assistant Runs Ops

A built-in Model Context Protocol server lets Claude Code, Cursor, Windsurf, and other AI tools query security data, trigger engagements, generate PoCs, and manage remediation

AI Assistant
MCP Protocol
Reaper
18
Query Tools
Exploit DB search, CVE lookup, dependencies, findings, alerts
6
Analysis Tools
PoC generation, compliance checks, security reports
11
Action Tools
Create fix PRs, trigger scans, manage incidents
Claude Code
$ Scan target api.example.com for vulnerabilities
reaper.trigger_project_scan
> Recon complete. Found 3 services: nginx/1.24 (ports 80,443), OpenSSH 8.9 (port 22), PostgreSQL 15.2 (port 5432). 2 known CVEs detected. Attack surface mapped.
$ Check if any CVEs have known exploits
reaper.get_exploits_by_cve
> CVE-2024-32760: 3 known exploits found. Exploit-DB #51234 (verified), Metasploit module exploit/multi/http/nginx_chunk_smuggle, actively exploited in the wild since 2024-03-15. Generating PoC...
Works with
Claude CodeCursorWindsurfAny MCP Client

Operate The Entire Offensive Workflow

From target onboarding to live engagements, incident handling, and fix PRs, Reaper keeps the offensive loop in one platform

01

Target Integration

Connect repositories from GitHub, GitLab, Bitbucket, Azure DevOps, Gitea, or SVN. Bulk import targets and keep branch-aware projects synced to the code you actually ship.

02

Attack Surface Discovery

Automated passive DNS discovery, host resolution, service fingerprinting, and technology detection map the external surface before operators spend time by hand.

03

Exploit Intelligence

Sync exploit data from Exploit-DB, GitHub PoCs, Metasploit modules, and in-the-wild feeds so teams know which vulnerabilities already have working offensive context.

04

Live Engagements

Run active, recent, and scheduled engagements with live logs, execution trees, ETAs, and human decision checkpoints when an operator needs to approve the next move.

05

Project Workspaces

Each project becomes a control room for alerts, vulnerabilities, logs, reports, Semgrep coverage, AI review, access control, and settings.

06

Vulnerability Scanning

Nuclei, Nmap, ffuf, subfinder, httpx, katana, Semgrep, detect-secrets, grype, and trivy combine offensive discovery with code and dependency signal.

07

Deterministic Defensive Signal

Optional Guardian sidecar adds code scanning, dependency analysis, vulnerability matching, and license compliance, then feeds that ground truth straight into offensive planning.

08

Recon Agent

A 3-phase AI audit agent explores your codebase to find logic flaws, race conditions, TOCTOU bugs, and insecure design patterns that signatures miss.

09

AI Exploit Agent

Every finding and CVE is reviewed for real exploitability. Reaper generates proof-of-concepts, prioritizes reachable risk, and keeps operators focused on attacks that matter.

10

Rule Generation

A multi-agent pipeline generates project-specific Semgrep rules, validates them, and gives teams global and per-project control over custom security coverage.

11

Autonomous Remediation

Generate AI-authored fix PRs from alerts and findings, stream remediation progress live, and keep a central history of proposed code changes.

12

MCP Orchestration

Built-in MCP support exposes query, analysis, and action workflows so assistants can launch scans, inspect findings, create incidents, and open fix PRs conversationally.

13

Incident Response

Create incidents manually or bootstrap them from URLs, text, or PDFs. Track timelines, linked alerts, status transitions, and AI-written incident reports.

14

Agent Control Plane

Configure agents, edit prompts, tune rate limits, review run history, inspect memory, and monitor live activity from one operator-facing control surface.

15

Enterprise Controls

Support passkeys, SSO, SCIM, RBAC, API keys, OAuth apps, MCP org controls, and optional Kali sidecar execution without breaking the offensive workflow.

Connect Any Target

Seamlessly connect target repositories from all major version control platforms

GitLab

GitLab.com and self-hosted GitLab instances with custom URL configuration

Self-Hosted SupportPersonal Access Token

Bitbucket

Bitbucket Cloud integration with workspace and repository access

App Password AuthWorkspace Access

Azure DevOps

Azure Repos integration with organization and project support

Personal Access TokenOrganization Repos

Gitea

Gitea and Forgejo self-hosted instances with configurable base URL

Self-HostedLightweight

SVN

Apache Subversion support with full checkout capabilities for legacy systems

Legacy SupportFull Checkout

Execute Operations Instantly

Operations that used to take weeks now take minutes

$ What services are running on target infrastructure?
> Automated recon maps all services, ports, and technology stacks in minutes.
$ Are any targets vulnerable to CVE-2024-XXXX? Any known exploits?
> Cross-reference CVEs against discovered services. Search Exploit-DB, GitHub PoCs, and Metasploit modules. Get exploit paths instantly.
$ Which targets share the same vulnerable service?
> Cross-target analysis identifies shared attack vectors and lateral movement paths.
$ What are the highest-value exploitation targets?
> Filter by severity and exploitability. Prioritize targets with validated attack paths.
$ What credentials and tokens have been discovered?
> Centralized loot view shows all discovered credentials, API keys, and sensitive data.
$ Which findings have validated proof-of-concept exploits?
> AI validates each finding with PoC generation. Focus on confirmed exploitable vulnerabilities.
$ What subdomains and hosts are exposed for the target domain?
> Passive DNS discovery maps all subdomains. Live probing identifies active targets.
AI
$ Generate a pentest report for the client
> AI generates comprehensive report with executive summary, attack narratives, risk assessment, and prioritized remediation. Export as PDF.
AI
$ What attack vectors should we test for this web application?
> AI analyzes the target, identifies 5 attack vectors: auth bypass, SQL injection, SSRF, path traversal, and missing rate limiting.
MCP
$Ask Claude Code: "Check if any project uses a vulnerable version of openssl"
>Claude calls reaper.search_dependencies, finds 3 projects with openssl < 3.1.4, then calls reaper.create_dependency_fix_pr to patch them.
AI Audit
$ Run a deep audit on the target's authentication system
> AI agent explores the codebase in 3 phases, finds a TOCTOU race condition in session handling and an auth bypass in the API gateway. High confidence.

Start Monitoring Your Assets

Connect your first project in under 5 minutes. No credit card required.