Skip to main content
Features

Everything you need for
modern security scanning

Pentora combines speed, accuracy, and extensibility to deliver a next-generation security scanning experience.

Core Features

Powerful capabilities designed for modern security teams

Lightning Fast Scanning

Optimized concurrent scanning engine that leverages Go's goroutines for maximum performance.

  • Scan thousands of ports in seconds
  • Intelligent connection pooling
  • Adaptive timeout mechanisms
  • Minimal resource consumption
🔍

Advanced Service Detection

Intelligent banner grabbing with protocol-aware parsers for accurate service identification.

  • SSH, HTTP, FTP, SMTP protocol detection
  • Version fingerprinting
  • Custom protocol support
  • TLS/SSL certificate analysis
🛡️

CVE Vulnerability Matching

Built-in vulnerability detection system that matches discovered services against known CVEs.

  • Real-time CVE database updates
  • Severity scoring (CVSS)
  • False positive filtering
  • Detailed remediation guidance
🧩

Extensible Plugin System

Write custom vulnerability checks and extend Pentora's capabilities with Go plugins.

  • Simple Go plugin API
  • Hot-reload support
  • Built-in testing framework
  • Community plugin marketplace
📊

Multiple Output Formats

Export scan results in various formats for integration with your existing workflows.

  • JSON for automation
  • HTML reports for sharing
  • CSV for spreadsheets
  • SARIF for CI/CD integration
🔐

Security First Design

Built with security best practices from the ground up.

  • No data collection or telemetry
  • Secure credential handling
  • Audit logging
  • Role-based access control (Enterprise)

How Pentora Compares

See how Pentora stacks up against other popular scanners

FeaturePentoraNmapOpenVAS
Scan SpeedOptimized Go concurrencyGood, but slowerSlower, more thorough
Plugin SystemNative Go pluginsNSE (Lua scripts)NASL scripts
CVE MatchingBuilt-in with updatesVia scriptsExtensive database
Ease of UseSimple CLI, JSON outputComplex flagsGUI required
Memory UsageMinimal (~50MB)Low (~30MB)High (~500MB+)
InstallationSingle binaryPackage managerComplex setup

Use Cases

Pentora adapts to your security workflow

🔒

Security Auditing

Perform comprehensive security assessments of your infrastructure.

  • Penetration testing
  • Vulnerability assessments
  • Attack surface mapping
  • Compliance scanning
🔄

DevOps & CI/CD

Integrate security scanning into your development pipeline.

  • Pre-deployment scanning
  • Infrastructure validation
  • Security gates in CI/CD
  • Automated reporting
📡

Network Monitoring

Continuously monitor your network for changes and vulnerabilities.

  • Service inventory
  • Change detection
  • Port monitoring
  • Unauthorized service detection
📋

Compliance & Governance

Meet regulatory requirements with comprehensive scanning.

  • PCI DSS compliance
  • SOC 2 requirements
  • ISO 27001 audits
  • HIPAA security rules

Technical Specifications

Performance

Scan Speed
Up to 10,000 ports/second
Concurrent Connections
Configurable (default: 1000)
Memory Usage
~50MB baseline
CPU Usage
Scales with cores

Protocols

TCP
Full support
UDP
Full support
ICMP
Ping & traceroute
Application Layer
HTTP, SSH, FTP, SMTP, DNS

Platform Support

Linux
x86_64, ARM64
macOS
Intel, Apple Silicon
Windows
x86_64
Docker
Multi-arch images

Integration

Output Formats
JSON, HTML, CSV, SARIF
API
RESTful API (Enterprise)
Webhooks
Real-time notifications
SDKs
Go, Python, JavaScript

Ready to try Pentora?

Get started with Pentora today. It's open source and free.