We’re Pentest-Tools.com, a team of 60 from Bucharest, Romania.💥
Since 2017, we’ve been building pentest tools that help security specialists like you:
🔍 Map attack surfaces
💥 Find & exploit vulnerabilities
📊 Report findings with clarity & confidence
[1/2]
Compared to the millions who use our free tools without one, you’ve run 3× more scans and that’s probably because you can.
Compared to the millions who use our free tools without one, you’ve run 3× more scans and that’s probably because you can.
Active exploitation confirmed: CVE-2025-11953.
#InfoSec #AppSec #RedTeam #VulnerabilityManagement #ReactNative
Active exploitation confirmed: CVE-2025-11953.
#InfoSec #AppSec #RedTeam #VulnerabilityManagement #ReactNative
Pentest-Tools.com is available in the AWS Marketplace.
You can now get our plans using your existing AWS cloud budget—keeping procurement simple and approvals fast.
#offensivesecurity #infosec #AWSMarketplace
Pentest-Tools.com is available in the AWS Marketplace.
You can now get our plans using your existing AWS cloud budget—keeping procurement simple and approvals fast.
#offensivesecurity #infosec #AWSMarketplace
We asked seasoned pentesters, red teamers, and builders of offensive tools to share where ML helps—and where it falls flat.
#offensivesecurity #securitycompliance #machinelearning
We asked seasoned pentesters, red teamers, and builders of offensive tools to share where ML helps—and where it falls flat.
#offensivesecurity #securitycompliance #machinelearning
So we made that conversation easier: We’ve doubled our yearly discount from 15% to 30%.
Lock in your tooling now so you don't have to battle for resources every month. 👇
So we made that conversation easier: We’ve doubled our yearly discount from 15% to 30%.
Lock in your tooling now so you don't have to battle for resources every month. 👇
Standard scanners miss what matters most:
🛠️ Proof of Remediation
📉 Context (Business > CVSS)
📋 Alignment to controls 🔄 Reproducibility
We automate this "evidence layer."
Get the guide to audit-ready evidence: pentest-tools.com/usage/compli...
Standard scanners miss what matters most:
🛠️ Proof of Remediation
📉 Context (Business > CVSS)
📋 Alignment to controls 🔄 Reproducibility
We automate this "evidence layer."
Get the guide to audit-ready evidence: pentest-tools.com/usage/compli...
We got tired of the noise, so we asked our own red team and engineers: "What are the newsletters you actually open every week?"
We got tired of the noise, so we asked our own red team and engineers: "What are the newsletters you actually open every week?"
Everyone talks about detecting #React2Shell (CVE-2025-55182). But detection based on banner grabbing is just a guess.
To truly know if you're exposed, you need to validate it.
So we launched the exploit.
Everyone talks about detecting #React2Shell (CVE-2025-55182). But detection based on banner grabbing is just a guess.
To truly know if you're exposed, you need to validate it.
So we launched the exploit.
With #NIS2 reshaping compliance, we’re proud to confirm Pentest-Tools.com is officially re-accredited by the DNSC as a cybersecurity auditor through 2028.
We build the scanners, and we’re certified to audit the results. 🛠️✅
With #NIS2 reshaping compliance, we’re proud to confirm Pentest-Tools.com is officially re-accredited by the DNSC as a cybersecurity auditor through 2028.
We build the scanners, and we’re certified to audit the results. 🛠️✅
Even worse? 44% have publicly exposed Next.js instances (Source: Wiz).
The "secure by design" assumption is failing.
✅ Detection is LIVE.
#AppSec #Infosec #ReactJS #React2Shell #CloudSecurity
Even worse? 44% have publicly exposed Next.js instances (Source: Wiz).
The "secure by design" assumption is failing.
✅ Detection is LIVE.
#AppSec #Infosec #ReactJS #React2Shell #CloudSecurity
At Infosecurity Europe 2025, our team (Adrian Furtună & Dragoş Sandu) demoed a live compromise of a private AWS infrastructure.
#Infosec #RedTeam #CloudSecurity #Pentesting #SOC2
At Infosecurity Europe 2025, our team (Adrian Furtună & Dragoş Sandu) demoed a live compromise of a private AWS infrastructure.
#Infosec #RedTeam #CloudSecurity #Pentesting #SOC2
We went from "zero access" to root by:
1️⃣ Tunneling in via VPN Agent
2️⃣ Chaining a Redis RCE
3️⃣ Bypassing Next.js auth to dump secrets
We went from "zero access" to root by:
1️⃣ Tunneling in via VPN Agent
2️⃣ Chaining a Redis RCE
3️⃣ Bypassing Next.js auth to dump secrets
Top community picks to build it:
The Web Application Hacker's Handbook
Red Team Development and Operations
Social Engineering (Hadnagy)
We curated 70+ more here: pentest-tools.com/blog/hacking...
#infosec #redteam
Top community picks to build it:
The Web Application Hacker's Handbook
Red Team Development and Operations
Social Engineering (Hadnagy)
We curated 70+ more here: pentest-tools.com/blog/hacking...
#infosec #redteam
New in Pentest-Tools.com:
🔥 3 Sniper RCE modules (Oracle EBS, React Native CLI, WordPress)
🛡️ ASP.NET Core request smuggling detection
🧠 Smarter SQLi testing
Play video www.youtube.com/watch?v=xQsT...
New in Pentest-Tools.com:
🔥 3 Sniper RCE modules (Oracle EBS, React Native CLI, WordPress)
🛡️ ASP.NET Core request smuggling detection
🧠 Smarter SQLi testing
Play video www.youtube.com/watch?v=xQsT...
🏢 Internal Teams: Automate scanning & cut the noise.
🤝 MSPs: Scale service delivery across clients.
🕵️♂️ Consultants: Validate faster & report with proof.
#infosec #vulnerabilitymanagement #redteam
🏢 Internal Teams: Automate scanning & cut the noise.
🤝 MSPs: Scale service delivery across clients.
🕵️♂️ Consultants: Validate faster & report with proof.
#infosec #vulnerabilitymanagement #redteam
Scaling security isn't about headcount; it's about automation.
Use our REST API to: 🚀 Trigger scans in CI/CD 📊 Pull machine-friendly JSON results 🔁 Script bulk operations
#DevSecOps #RedTeam #Automation #Infosec
Scaling security isn't about headcount; it's about automation.
Use our REST API to: 🚀 Trigger scans in CI/CD 📊 Pull machine-friendly JSON results 🔁 Script bulk operations
#DevSecOps #RedTeam #Automation #Infosec
Scanners produce noise, not proof. This leaves teams chasing false positives and delivering reports that fail to earn confidence.
Read our new white paper here: pentest-tools.com/usage/accuracy
Scanners produce noise, not proof. This leaves teams chasing false positives and delivering reports that fail to earn confidence.
Read our new white paper here: pentest-tools.com/usage/accuracy
The gap between your quarterly pentests is exactly where attackers thrive. They don’t wait for your schedule, and your defense shouldn't either.
Turn security from a snapshot into a continuous process.
The gap between your quarterly pentests is exactly where attackers thrive. They don’t wait for your schedule, and your defense shouldn't either.
Turn security from a snapshot into a continuous process.
That’s what Razvan Ionescu covered in our session How attackers think.
We talked about what’s actually exploitable in AI-heavy stacks, logic flaws, bad integrations, and assumptions no scanner can catch.
That’s what Razvan Ionescu covered in our session How attackers think.
We talked about what’s actually exploitable in AI-heavy stacks, logic flaws, bad integrations, and assumptions no scanner can catch.
Another year, another incredible edition in the books. We are so proud to have been part of this event once again and to see the community showing up in full force in Bucharest.
#DefCamp2025 #OffensiveSecurity #InfosecCommunity #Cybersecurity #Pentesting
Another year, another incredible edition in the books. We are so proud to have been part of this event once again and to see the community showing up in full force in Bucharest.
#DefCamp2025 #OffensiveSecurity #InfosecCommunity #Cybersecurity #Pentesting
Attackers don’t care what built your app. They care how it breaks.
Attackers don’t care what built your app. They care how it breaks.
#infosec #cybersecurity #offensivesecurity #ransomware #incidentresponse
#infosec #cybersecurity #offensivesecurity #ransomware #incidentresponse
#vulnerabilityassessment #informationsecurity #cybersecurity #pentesting
#vulnerabilityassessment #informationsecurity #cybersecurity #pentesting
Attackers don’t stop at the login screen.
🏴☠️ They target what’s behind it: broken access controls, IDORs, insecure password policies, and privilege escalation paths.
1/3
Attackers don’t stop at the login screen.
🏴☠️ They target what’s behind it: broken access controls, IDORs, insecure password policies, and privilege escalation paths.
1/3
Last year’s DefCamp reminded us what this community is all about: real talks, real bugs, and real people who love breaking things for the right reasons. www.youtube.com/watch?v=QcVF...
Last year’s DefCamp reminded us what this community is all about: real talks, real bugs, and real people who love breaking things for the right reasons. www.youtube.com/watch?v=QcVF...