SKJDMRAL
+8

Speed up reconnaissance and offensive workflows.

Sentinelle helps pentesters and bug bounty hunters focus on high-value targets instead of repetitive recon.

Built on the tools you already trust
OWASPMITRE ATT&CKCVEBurp SuiteNmapOWASP ZAPNucleiMetasploitWiresharkOWASPMITRE ATT&CKCVEBurp SuiteNmapOWASP ZAPNucleiMetasploitWireshark
sqlmapffufhashcatKali LinuxBashcurlHackTheBoxTryHackMesqlmapffufhashcatKali LinuxBashcurlHackTheBoxTryHackMe

06 — From the field

Pentesters and builders,in their own words.

  • 01Attack-path reasoning
    I thought I was testing yet another scanner. Then I watched it chain logical steps, pivot, and push all the way to exploitation. It's the first time an agent actually felt like it was hunting.
    TM

    Theo M.

    Pentester · Independent researcher

  • 02Continuous adaptation
    What changes everything is the continuity. The agent doesn't just fire off a scan — it watches, adapts, and switches direction the moment it senses a lead.
    LM

    Lea M.

    Security Engineer · Series A infra team

  • 03Red-team leverage
    We don't have the headcount for a full-time red team. With Sentinelle, we finally have a credible offensive layer running while we ship.
    JR

    Julien R.

    CTO · Seed-stage SaaS

  • 04Less noise, more proof
    The signal is clean. No flood of useless alerts — just exploitable attack paths with enough context to act on, fast.
    NK

    Nassim K.

    Offensive researcher · Private lab

  • 05Fewer false positives
    Usually, security tools slow us down. Here, every alert felt like it actually deserved the team's attention. That's rare.
    AP

    Alice P.

    Builder · Product + engineering

  • 06Goes past first query
    It's the first tool I felt actually wanted to understand the target, instead of just ticking boxes.
    CS

    Clara S.

    Early adopter · Security-first startup

02 — Workflow

From brief to report, no detours.

A loop you can interrupt, redirect, re-prompt — Sentinelle is always one message away.

01 · Step

Define a target

A URL, a CIDR, a GraphQL schema. Scope is yours — Sentinelle stays in bounds.

Scope
api.target.com
Rules
No destructive payload · rate 30 r/s
Auth
Bearer · 2 tenants provided
03 — Pricing

Pick the plan that matches your hunting.

From your first mission to running pentests as a day job — every plan ships with the same agent and the same toolkit. You pay for usage, not for tools.

Test drive

Test Sentinel on your own assets.

$0to try
Start testing
  • 3 missions / month · 1 concurrent · 30 min max
  • Active recon + sandbox exploitation
  • 300K AI tokens / mission
  • 7-day findings retention
  • Markdown / JSON export
  • Sentinel trial watermark on exports

Hunter

Hunt bounties before anyone else maps the surface.

$79/ month
Start hunting
  • 30 missions / month · 1 concurrent · 4h max
  • 18 built-in playbooks (auth, JWT, IDOR, SSRF, OAuth, deser…)
  • 1.5M AI tokens / mission
  • 30-day findings retention
  • Export JSON / CSV / Markdown / SARIF
  • 3 saved scopes · 1 custom playbook of your own

Elite

Run a pentest firm under your own brand.

$700/ month
Go Elite
  • 300 missions / month · 10 concurrent · 48h max
  • All built-in playbooks + 100 of your own custom recipes
  • 10M AI tokens / mission
  • 3-year findings retention
  • White-label PDF (your logo on every report)
  • 100 saved scopes
  • Data residency FR (option)
  • 1-on-1 onboarding · priority compute

The $0 tier is for testing and evaluation. Paid plans are priced in USD, billed monthly. Cancel anytime.

Frequently asked questions

Everything you need to know before launching your first mission. Another question? The blog covers the rest.

Read the blog

AI pentesting is an end-to-end offensive security audit executed by an autonomous agent that plans, runs and reports vulnerabilities with no human in the loop.

Yes — as long as you only target systems you are authorized to test. Sentinelle enforces a mission authorization gate before any scan.

Burp Suite is a manual attack proxy. Sentinelle is an autonomous agent that decides what to attack, runs the tools and writes the report — no human intervention after the initial scope.

You describe your perimeter in natural language; Sentinelle verifies ownership (DNS TXT for own assets, bug bounty token for platforms) before testing.

Mission data is hosted in the EU (Hostkey France + Supabase) and encrypted at rest. Reports belong to you and are purged according to your plan's retention.

Yes — Hunter, Pro and Elite plans include HackerOne and Bugcrowd integrations to pull your programs and launch Sentinelle on the declared scope.

Free is for trying it out, Hunter targets solo bug bounty hunters, Pro fits freelance pentesters with multiple clients, Elite is for intensive pros with long retention and advanced integrations.

No — Sentinelle augments the pentester by automating recon and the first wave of exploitation. Final validation and offensive creativity stay human.

Stop scanning. Start hunting.

Spin up your first autonomous mission in under a minute.