Quickstart Guide
Get started with Pensar Apex and run your first automated penetration test in minutes. This guide walks you through launching the tool, configuring it, and running both interactive and command-line pentests.Before starting, ensure you have:
- Installed Pensar Apex (Installation Guide)
- Configured an AI provider API key
- Run
pensar doctorto verify your setup
Launch the Interactive TUI
The easiest way to get started is using the interactive Terminal User Interface (TUI):First Launch Experience
Accept Responsible Use Disclosure
On first launch, you’ll see the Responsible Use Disclosure screen:Press Enter to accept and continue.
Configure AI Provider (if needed)
If no API key is detected, you’ll be routed to the Provider Manager screen:
- Select your AI provider (Anthropic, OpenAI, etc.)
- Enter your API key
- Choose a default AI model
The TUI will guide you through this configuration. Your settings are saved to
~/.pensar/config.json.TUI Navigation
Use these keyboard shortcuts to navigate the TUI:Essential Shortcuts
Essential Shortcuts
- Ctrl+P: Open command palette (access all features)
- Ctrl+C: Cancel current operation (press twice to exit)
- Tab: Switch between input fields
- ↑/↓: Navigate through lists and history
- Enter: Select/confirm
- Esc: Go back/cancel
Session Management
Session Management
- Ctrl+S: View and manage sessions
- Ctrl+N: Start new pentest session
- Ctrl+R: Resume previous session
Advanced
Advanced
- Ctrl+L: Clear screen
- Ctrl+H: Show help dialog
- Ctrl+K: Show keyboard shortcuts
- Ctrl+Q: Quick exit
Run Your First Pentest
Let’s run a penetration test against a target. We’ll demonstrate both interactive and command-line approaches.Interactive Mode (TUI)
Start New Pentest
- Press Ctrl+P to open the command palette
- Select “Start Pentest” or press Ctrl+N
- Choose pentest type:
- Blackbox: Test a live target without source code
- Whitebox: Test with source code access
- Targeted: Focus on specific objectives
Configure Target
Enter your target details:
- Target URL/IP:
https://example.com - Source path (whitebox only):
/path/to/source - AI Model: Select from available models
Watch the Agent Work
The AI agent will begin testing, showing real-time progress:
- Attack surface discovery
- Endpoint enumeration
- Vulnerability testing
- Exploitation attempts
- PoC generation
Command-Line Mode
For automation and scripting, use the CLI directly:Blackbox Penetration Test
Test a live target without source code access:Whitebox Penetration Test
Test with source code access for deeper analysis:Targeted Penetration Test
Focus on specific vulnerabilities or objectives:CLI Options
Target URL, domain, or IP address to test
Path to source code for whitebox testing
Pentest mode:
exfil enables pivoting and flag extractionAI model to use (default:
claude-sonnet-4-5)Testing objective for targeted pentests (can be used multiple times)
Understanding the Output
Findings File
Vulnerabilities are saved in structured JSON format at:Proof-of-Concept Files
Exploits are saved in thepocs/ directory:
Report File
A human-readable markdown report is generated at:Advanced Usage
Using Different AI Models
Specify a custom AI model for your pentest:claude-sonnet-4-5(Anthropic, recommended)claude-opus-4(Anthropic, most capable)gpt-4o(OpenAI)gpt-4-turbo(OpenAI)
Exfil Mode for Red Teams
Enable pivoting and flag extraction for CTF or red team exercises:Resume Previous Sessions
View and resume previous pentest sessions:Using Local Models (vLLM)
For air-gapped environments or local model deployment:Best Practices
Start with Targeted Testing
Start with Targeted Testing
When testing a new application, start with targeted pentests focused on specific objectives. This helps you understand the agent’s capabilities and provides faster, more focused results.
Review Agent Progress
Review Agent Progress
Monitor the agent’s actions in real-time to:
- Understand its testing methodology
- Learn new attack techniques
- Catch false positives early
- Stop tests that are going off-track
Validate Findings
Validate Findings
Always manually validate vulnerabilities before reporting:
- Run the provided PoC scripts
- Verify the impact and exploitability
- Test remediation recommendations
- Document additional context
Use Whitebox When Possible
Use Whitebox When Possible
If you have access to source code, use whitebox testing for:
- More comprehensive vulnerability coverage
- Logic flaw detection
- Configuration issue identification
- Faster and more accurate results
Save and Organize Sessions
Save and Organize Sessions
Use descriptive names for sessions and organize findings:
Troubleshooting
Agent is stuck or not making progress
Agent is stuck or not making progress
Symptoms: Agent repeats the same actions or doesn’t discover anythingSolutions:
- Press Ctrl+C to cancel the current operation
- Try a different AI model (Anthropic models work best)
- Use targeted pentest with specific objectives
- Verify the target is accessible and responding
No vulnerabilities found
No vulnerabilities found
Symptoms: Pentest completes but reports 0 findingsSolutions:
- The target may be well-secured (this is good!)
- Try whitebox testing with source code access
- Use targeted testing with specific vulnerability types
- Ensure nmap is installed for network scanning
- Check that the target is reachable and responding
API rate limits or quota exceeded
API rate limits or quota exceeded
Symptoms: Agent stops with API errorsSolutions:
- Check your AI provider’s rate limits and quotas
- Wait a few minutes and resume the session
- Switch to a different AI provider
- Consider using a local vLLM model for unlimited usage
PoC scripts don't work
PoC scripts don't work
Symptoms: Generated exploit code fails to runSolutions:
- Verify the target is still vulnerable (may have been patched)
- Check for missing dependencies in the PoC script
- Manually adjust the script based on error messages
- The vulnerability may be a false positive—validate manually
Next Steps
CLI Reference
Complete command-line reference for all pensar commands
TUI Guide
Learn advanced TUI features and keyboard shortcuts
Configuration
Customize Pensar Apex settings and preferences
Environment Variables
Configure Pensar Apex for CI/CD and automation
Get Help
Documentation
Browse the full documentation
Discord Community
Ask questions and share experiences
GitHub Issues
Report bugs or request features

