Overview
PentAGI provides a comprehensive suite of professional security testing tools, all executed in isolated Docker containers for maximum safety. Every tool execution is logged, monitored, and stored in long-term memory for future reference.20+ Pro Tools
Industry-standard security testing utilities
Sandboxed Execution
Complete isolation in Docker containers
Automatic Logging
All commands and outputs recorded
Smart Selection
AI-powered tool and image selection
Available Tools
PentAGI includes 20+ professional security tools out of the box:Network Scanning & Discovery
nmap
nmap
Network Mapper - The industry-standard network scanning toolCapabilities:
- Port scanning and service detection
- OS fingerprinting
- Vulnerability detection with NSE scripts
- Network topology mapping
masscan
masscan
High-Speed Port Scanner - Fastest port scanner for large networksCapabilities:
- Scan entire internet in under 5 minutes
- Custom packet crafting
- Banner grabbing
Web Application Testing
sqlmap
sqlmap
Automatic SQL Injection Tool - Detect and exploit SQL injection flawsCapabilities:
- Automatic SQL injection detection
- Database fingerprinting
- Data extraction from databases
- Database takeover features
nikto
nikto
Web Server Scanner - Comprehensive web server vulnerability scannerCapabilities:
- 6700+ potential vulnerabilities
- Outdated software detection
- Dangerous files and CGI scanning
- Server misconfiguration checks
wpscan
wpscan
WordPress Security Scanner - Specialized WordPress vulnerability scannerCapabilities:
- WordPress version detection
- Plugin/theme vulnerability scanning
- User enumeration
- Password brute forcing
Exploitation Frameworks
metasploit
metasploit
Metasploit Framework - The world’s most used penetration testing frameworkCapabilities:
- 2300+ exploit modules
- Payload generation and delivery
- Post-exploitation modules
- Vulnerability validation
Credential Testing
hydra
hydra
Network Login Cracker - Fast and flexible password crackerCapabilities:
- 50+ protocol support (SSH, FTP, HTTP, etc.)
- Parallel connection attacks
- Custom brute force patterns
- Restore interrupted sessions
john
john
John the Ripper - Password hash crackerCapabilities:
- Hash type auto-detection
- Wordlist and brute force modes
- Custom rule-based attacks
- Support for numerous hash types
SSL/TLS Testing
testssl
testssl
SSL/TLS Security Scanner - Comprehensive SSL/TLS testing toolCapabilities:
- Protocol and cipher testing
- Certificate validation
- Known vulnerability detection (Heartbleed, POODLE, etc.)
- HTTP security headers analysis
DNS & Subdomain Enumeration
subfinder
subfinder
Subdomain Discovery Tool - Passive subdomain enumerationCapabilities:
- Passive subdomain discovery
- Multiple data source integration
- Fast and reliable enumeration
dnsx
dnsx
DNS Toolkit - Fast DNS resolution and validationCapabilities:
- DNS record queries
- Wildcard filtering
- Fast DNS validation
- Multiple resolver support
Terminal Tool Integration
All security tools are accessed through PentAGI’s terminal tool:Terminal Tool Schema
Execution Examples
Sandboxed Environment
Docker Isolation
Every penetration test runs in an isolated Docker container:Security Features
Network Isolation
Containers run in isolated networks with controlled access to targets
Resource Limits
CPU and memory limits prevent resource exhaustion
Capability Restrictions
Minimal Linux capabilities (NET_RAW, optional NET_ADMIN)
Automatic Cleanup
Containers automatically destroyed after test completion
Container Lifecycle
Execution Logging
Automatic Command Logging
All terminal interactions are automatically logged:Terminal Log Format
Memory Storage
Terminal outputs are automatically stored in vector database:Smart Container Management
Dynamic Image Selection
PentAGI automatically selects the appropriate Docker image based on task requirements:.env
Primary Container
Each flow gets a dedicated primary container:Container Status Tracking
File Management
Manage files in the container environment:File Tool Schema
File Operations
Timeout Management
Configurable Timeouts
Background Execution
Long-running tasks can execute in background:- Returns immediately with status message
- Continues running in background
- Check results later with file reads
- 500ms quick check before detaching
Best Practices
Tool Selection
Tool Selection
- Use nmap for initial reconnaissance
- Use specialized tools (sqlmap, nikto) for specific vulnerabilities
- Leverage metasploit for exploitation
- Use hydra/john for credential testing
Resource Management
Resource Management
- Set appropriate timeouts for long-running scans
- Use detached mode for extensive operations
- Monitor container resource usage
- Clean up containers after completion
Output Handling
Output Handling
- Save scan results to files for later analysis
- Use structured output formats (JSON, XML) when possible
- Store successful techniques in memory
- Leverage automatic result summarization
Security Considerations
Security Considerations
- Always test in authorized environments
- Use appropriate scan intensity to avoid DoS
- Verify target scope before testing
- Follow responsible disclosure practices
Related Resources
Autonomous Testing
Learn about AI-powered test automation
Reporting
Generate professional security reports
Monitoring
Track tool execution and performance
Quick Start
Get started with PentAGI