Powerful Features

PenPeeper combines AI-powered analysis, automated scanning, and intelligent organization to help you discover vulnerabilities faster and deliver professional reports with confidence.

LLM Settings

LLM Integration Settings

Configure local or cloud AI providers including LM Studio, Ollama, OpenRouter, Claude, Gemini, ChatGPT, or custom endpoints for intelligent vulnerability analysis.

AI Vulnerability Hunting

AI-Assisted Vulnerability Hunting

Scan specific devices or all devices at once with AI-powered vulnerability detection. Control minimum confidence and severity levels to focus on what matters most.

AI Evidence Generator

AI Evidence Examination

Automatically search device information and scan results for existing proof of vulnerabilities. Get AI-recommended commands and tools for concrete verification.

AI Recommendation Generator

AI-Generated Recommendations

Get best practice remediation guidance for specific vulnerabilities. AI analyzes context and provides actionable recommendations tailored to your findings.

AI Executive Summary

AI Executive Summary

Generate custom executive summaries for reports based on all confirmed findings, their severity levels, and vulnerability categories. Professional results in seconds.

NVD Integration

National Vulnerability Database Integration

Direct integration with the NVD to automatically pull CVE information and populate vulnerability details with official data, severity scores, and descriptions.

Keyword Search

Smart Keyword Category Search

Quickly identify and assign appropriate vulnerability categories and subcategories using intelligent keyword filtering. Streamlines finding classification and organization.

Add Findings

Add and Manage Findings

Easily flag issues and manage findings throughout your engagement. Track incomplete findings and ensure all vulnerabilities are properly documented.

Assign Icons

Assign Icons to Devices

Visually organize your network with custom device icons. Quickly identify device types at a glance for better project navigation.

Convert Manual Finding to CVE

Convert Manual Findings to CVEs

Transform manual findings into standardized CVE entries with automatic data population from the National Vulnerability Database.

Automatic Device Info

Auto-Populated Device Information

Device details are automatically extracted and organized from scan results. No more manual parsing of Nmap output or other tool results.

Directly Flag a Scan of Interest

Flag Scans Directly

Found something interesting in raw scan output? Flag it immediately to add to your findings list for later investigation and reporting.

Check Incomplete Findings

Track Incomplete Findings

Never lose track of partial findings. Filter view shows exactly which vulnerabilities still need verification or additional information.

Export

Export Encrypted Projects

Securely export entire projects with all scans, findings, and data for sharing with team members or backing up engagement data.

Flag a Non-device

Flag Non-Device Findings

Document vulnerabilities that aren't tied to specific devices like policy violations, physical security issues, or social engineering gaps.

Import

Import External Scans

Bring in scan results from other tools and platforms. Import screenshots, custom notes, and third-party security tool outputs.

Filtering Options

Advanced Filtering

Search and filter by service, port, protocol, vendor, banner, tags, and more. Find exactly what you're looking for across all devices.

Move Device

Move Devices Between Projects

Reorganize devices across different projects as your engagement scope changes or when managing multiple client assessments.

Prevent Reruns

Prevent Accidental Scan Reruns

Visual indicators show which scans have already been run on each device. Avoid wasting time and potentially alerting targets with duplicate scans.

Report Generator Descriptions

Guided Report Generation

Built-in help provides descriptions and realistic examples for each report section. Never stare at a blank page wondering what to write.

Custom Summary Graphics

Custom Summary Graphics

Choose from multiple professional chart styles to visualize your findings. Preview each graphic type before including in your report.

Concurrent Scans

Configure Concurrent Scans

Control how many scans run simultaneously to balance speed with network impact. Test tool connectivity before launching assessment.

Telnet Built In

Built-in Telnet Client

Connect directly to devices via Telnet from within the application. Test credentials and verify vulnerabilities without switching tools.