The AI That Thinks Like a Red Teamer
35 autonomous agents. 12 scan phases. Chain of Thought reasoning.
Open Source Core • 22 Tool Integrations • Works with any LLM
See It In Action
Watch zeScanner orchestrate a real penetration test.
How It Works
From target to report in three steps.
Target
Point it at a target — IPs, CIDRs, domains, or use pre-built scan recipes to get started instantly.
Orchestrate
35 AI agents coordinate across 12 phases. The LLM reasons about strategy, adapts tactics, and chains tools intelligently.
Report
Get actionable results — correlated findings, attack chains, compliance mapping, and MITRE ATT&CK coverage.
Agent Orchestration
29 specialized agents coordinated through 12 scan phases.
Phase 1: Passive Reconnaissance
2 agents
Gather intelligence from public sources without touching the target. WHOIS lookups, certificate transparency logs, DNS records, and OSINT collection to build a complete picture before active scanning begins.
Intelligent Security Features
Powered by LLM reasoning and multi-agent orchestration.
LLM Reasoning
Chain of Thought strategic reasoning. The AI analyzes scan state and adapts strategy in real time.
Adaptive Evasion
Detects WAF/IDS responses and adjusts scan parameters dynamically. Rate limiting, fragmentation, decoys.
Attack Chain Correlation
Connects findings across phases into exploitable attack paths. SQLi → Creds → SSH → Root.
RAG Intelligence
Cross-references NVD, ExploitDB, EPSS scores, CISA KEV, and GitHub PoCs for enriched context.
Article-to-Scan
Feed a security blog post and auto-generate a targeted scan configuration with CVEs and IOCs.
Compliance Mapping
Automated checks against PCI-DSS, CIS benchmarks, and TLS best practices.
Attack Chain Correlation
zeScanner connects findings across phases into exploitable attack paths.
Select a node to view finding details
Scan Profiles
From paranoid stealth to maximum speed.
Balanced
General purpose (default)
zescanner -t target -p balanced Tool Integrations
22+ security tools, orchestrated by AI.
Port Scanning
Network scanner
Fast port scanner
Vulnerability
Template-based scanner
Web server scanner
WordPress scanner
Web Testing
Web fuzzer
TLS/SSL testing
HTTP client
Enumeration
SMB enumeration
SMB client
SNMP enumeration
SNMP assessment
SSH auditing
DNS lookup
LDAP queries
RPC enumeration
Exploitation
Exploit framework
Login bruteforce
SQL injection
OSINT
Subdomain discovery
Email & domain OSINT
Domain registration
Scan Recipes
Pre-configured scans for common scenarios.
How zeScanner Compares
The first AI-native penetration testing framework.
| Feature | zeScanner | Nessus | Burp Suite | OpenVAS | Metasploit |
|---|---|---|---|---|---|
| LLM Reasoning / CoT | ✓ | — | — | — | — |
| Multi-Agent Orchestration | ✓ | — | — | — | — |
| Attack Chain Correlation | ✓ | — | — | — | — |
| Adaptive Evasion | ✓ | — | Partial | — | Partial |
| CLI-First Interface | ✓ | — | — | — | ✓ |
| Article-to-Scan | ✓ | — | — | — | — |
| RAG Intelligence | ✓ | — | — | — | — |
| Auto Strategy Adaptation | ✓ | — | — | — | — |
| Compliance Checks | ✓ | ✓ | — | Partial | — |
| Open Source Core | ✓ | — | — | ✓ | ✓ |
| Custom Scan Recipes | ✓ | Partial | Partial | — | — |
| Confidence Scoring | ✓ | — | — | — | — |
zeScanner: 12/12 features • Nearest competitor: 3/12
Works With Any LLM
Bring your own provider. Run locally with Ollama for complete privacy.
Anthropic
DefaultClaude Sonnet 4.5
ANTHROPIC_API_KEY
OpenAI
GPT-4 Turbo
OPENAI_API_KEY
Groq
FastLlama 3.1 70B
GROQ_API_KEY
Ollama
PrivacyQwen 2.5 7B
No API key needed
Code Examples
Get started in seconds.
# Install zeScanner
pip install zescanner
# Set your API key
export ANTHROPIC_API_KEY="sk-ant-..."
# Run your first scan
zescanner -t 192.168.1.0/24
Choose Your Plan
Open source core with professional features.
Community
- Core scan agents (25+)
- All 6 scan profiles
- 12 scan recipes
- CLI interface
- Basic reporting (MD/JSON/HTML)
- Community support
- MIT License
Get notified at launch
Pro
- Everything in Community
- Advanced agents (AD, exploit, post-exploit)
- RAG threat intelligence enrichment
- Article-to-Scan pipeline
- Attack chain visualization
- Priority support
- Custom integrations
Get notified when Pro launches
Get Early Access
Be the first to know when zeScanner launches. Join the waitlist.
Open Source Core • No Cloud Required • Pro Features Available