Core Features
Powerful capabilities designed for modern security teams
Lightning Fast Scanning
Optimized concurrent scanning engine that leverages Go's goroutines for maximum performance.
- ✓Scan thousands of ports in seconds
- ✓Intelligent connection pooling
- ✓Adaptive timeout mechanisms
- ✓Minimal resource consumption
Advanced Service Detection
Intelligent banner grabbing with protocol-aware parsers for accurate service identification.
- ✓SSH, HTTP, FTP, SMTP protocol detection
- ✓Version fingerprinting
- ✓Custom protocol support
- ✓TLS/SSL certificate analysis
CVE Vulnerability Matching
Built-in vulnerability detection system that matches discovered services against known CVEs.
- ✓Real-time CVE database updates
- ✓Severity scoring (CVSS)
- ✓False positive filtering
- ✓Detailed remediation guidance
Extensible Plugin System
Write custom vulnerability checks and extend Pentora's capabilities with Go plugins.
- ✓Simple Go plugin API
- ✓Hot-reload support
- ✓Built-in testing framework
- ✓Community plugin marketplace
Multiple Output Formats
Export scan results in various formats for integration with your existing workflows.
- ✓JSON for automation
- ✓HTML reports for sharing
- ✓CSV for spreadsheets
- ✓SARIF for CI/CD integration
Security First Design
Built with security best practices from the ground up.
- ✓No data collection or telemetry
- ✓Secure credential handling
- ✓Audit logging
- ✓Role-based access control (Enterprise)
How Pentora Compares
See how Pentora stacks up against other popular scanners
| Feature | Pentora | Nmap | OpenVAS |
|---|---|---|---|
| Scan Speed | Optimized Go concurrency | Good, but slower | Slower, more thorough |
| Plugin System | Native Go plugins | NSE (Lua scripts) | NASL scripts |
| CVE Matching | Built-in with updates | Via scripts | Extensive database |
| Ease of Use | Simple CLI, JSON output | Complex flags | GUI required |
| Memory Usage | Minimal (~50MB) | Low (~30MB) | High (~500MB+) |
| Installation | Single binary | Package manager | Complex setup |
Use Cases
Pentora adapts to your security workflow
Security Auditing
Perform comprehensive security assessments of your infrastructure.
- Penetration testing
- Vulnerability assessments
- Attack surface mapping
- Compliance scanning
DevOps & CI/CD
Integrate security scanning into your development pipeline.
- Pre-deployment scanning
- Infrastructure validation
- Security gates in CI/CD
- Automated reporting
Network Monitoring
Continuously monitor your network for changes and vulnerabilities.
- Service inventory
- Change detection
- Port monitoring
- Unauthorized service detection
Compliance & Governance
Meet regulatory requirements with comprehensive scanning.
- PCI DSS compliance
- SOC 2 requirements
- ISO 27001 audits
- HIPAA security rules
Technical Specifications
Performance
- Scan Speed
- Up to 10,000 ports/second
- Concurrent Connections
- Configurable (default: 1000)
- Memory Usage
- ~50MB baseline
- CPU Usage
- Scales with cores
Protocols
- TCP
- Full support
- UDP
- Full support
- ICMP
- Ping & traceroute
- Application Layer
- HTTP, SSH, FTP, SMTP, DNS
Platform Support
- Linux
- x86_64, ARM64
- macOS
- Intel, Apple Silicon
- Windows
- x86_64
- Docker
- Multi-arch images
Integration
- Output Formats
- JSON, HTML, CSV, SARIF
- API
- RESTful API (Enterprise)
- Webhooks
- Real-time notifications
- SDKs
- Go, Python, JavaScript
Ready to try Pentora?
Get started with Pentora today. It's open source and free.