PenPeeper combines AI-powered analysis, automated scanning, and intelligent organization to help you discover vulnerabilities faster and deliver professional reports with confidence.
Configure local or cloud AI providers including LM Studio, Ollama, OpenRouter, Claude, Gemini, ChatGPT, or custom endpoints for intelligent vulnerability analysis.
Scan specific devices or all devices at once with AI-powered vulnerability detection. Control minimum confidence and severity levels to focus on what matters most.
Automatically search device information and scan results for existing proof of vulnerabilities. Get AI-recommended commands and tools for concrete verification.
Get best practice remediation guidance for specific vulnerabilities. AI analyzes context and provides actionable recommendations tailored to your findings.
Generate custom executive summaries for reports based on all confirmed findings, their severity levels, and vulnerability categories. Professional results in seconds.
Direct integration with the NVD to automatically pull CVE information and populate vulnerability details with official data, severity scores, and descriptions.
Quickly identify and assign appropriate vulnerability categories and subcategories using intelligent keyword filtering. Streamlines finding classification and organization.
Easily flag issues and manage findings throughout your engagement. Track incomplete findings and ensure all vulnerabilities are properly documented.
Visually organize your network with custom device icons. Quickly identify device types at a glance for better project navigation.
Transform manual findings into standardized CVE entries with automatic data population from the National Vulnerability Database.
Device details are automatically extracted and organized from scan results. No more manual parsing of Nmap output or other tool results.
Found something interesting in raw scan output? Flag it immediately to add to your findings list for later investigation and reporting.
Never lose track of partial findings. Filter view shows exactly which vulnerabilities still need verification or additional information.
Securely export entire projects with all scans, findings, and data for sharing with team members or backing up engagement data.
Document vulnerabilities that aren't tied to specific devices like policy violations, physical security issues, or social engineering gaps.
Bring in scan results from other tools and platforms. Import screenshots, custom notes, and third-party security tool outputs.
Search and filter by service, port, protocol, vendor, banner, tags, and more. Find exactly what you're looking for across all devices.
Reorganize devices across different projects as your engagement scope changes or when managing multiple client assessments.
Visual indicators show which scans have already been run on each device. Avoid wasting time and potentially alerting targets with duplicate scans.
Built-in help provides descriptions and realistic examples for each report section. Never stare at a blank page wondering what to write.
Choose from multiple professional chart styles to visualize your findings. Preview each graphic type before including in your report.
Control how many scans run simultaneously to balance speed with network impact. Test tool connectivity before launching assessment.
Connect directly to devices via Telnet from within the application. Test credentials and verify vulnerabilities without switching tools.