AI-powered penetration testing using autonomous agents — directly in your terminal. Run blackbox and whitebox pentests that explore, reason, and surface real vulnerabilities.
Want to run from the cloud or integrate it with your CI/CD? See Pensar Console.
- Run
/pentestbefore merging a PR — catch vulnerabilities as naturally as running tests - Get actionable findings with severity scores, evidence, and suggested fixes — no security background needed
- Integrate into CI/CD via headless CLI commands or Pensar Console
- Deploy agent-driven swarm testing across large attack surfaces
- Use
/operatormode for manual investigation, exploit chaining, and validation - Automate repetitive testing workflows with persistent memory that accumulates across engagements
- Scale across teams and projects through Pensar Console
| Method | Command |
|---|---|
| Quick Install (macOS/Linux) | curl -fsSL https://pensarai.com/install.sh | bash |
| Homebrew | brew tap pensarai/tap && brew install apex |
| npm | npm install -g @pensar/apex |
| Windows (PowerShell) | irm https://www.pensarai.com/apex.ps1 | iex |
Open the Apex TUI:
pensarRun pentests without the TUI for scripting, CI, or evalgate integration:
# Basic pentest
pensar pentest --target https://example.com
# With extended thinking and task-driven mode
pensar pentest --target https://example.com --extended-thinking --task-driven
# Whitebox (with source code access)
pensar pentest --target https://example.com --cwd ./my-app
# Targeted pentest with specific objectives
pensar targeted-pentest --target https://example.com --objective "Test authentication bypass"| Flag | Command | Description |
|---|---|---|
--target <url> |
pentest, targeted-pentest | Target URL (required) |
--cwd <path> |
pentest | Source code path for whitebox mode |
--mode <mode> |
pentest | exfil for pivoting and flag extraction |
--model <model> |
pentest, targeted-pentest | AI model (default: auto-selected) |
--extended-thinking |
pentest | Enable extended thinking for supported models |
--task-driven |
pentest | Enable task-driven architecture (experimental) |
--prompt <text|@file> |
pentest | Custom guidance for the agent |
--threat-model <text|@file> |
pentest | Threat model to guide testing |
--objective <text> |
targeted-pentest | Testing objective (repeatable) |
Stream step-level agent traces to Weights & Biases Weave for analysis and fine-tuning:
export WANDB_API_KEY=your-key
export WANDB_ENTITY=your-entity
# WANDB_PROJECT defaults to "apex-traces"
pensar pentest --target https://example.comTraces include reasoning steps, tool calls, token usage, and state checkpoints. When credentials are not set, tracing is silently disabled.
For best performance, run Apex in the included Kali Linux container with preconfigured pentest tools:
cd container
cp env.example .env # add your API keys
docker compose up --build -d
docker compose exec kali-apex bashInside the container, run:
pensarThis repository contains tools for authorized security testing only. Before use, please read and agree to the Responsible Use Disclosure.