AttackVector.tech
Security Assessment Pipeline

How AttackVector Works

A multi-stage, non-destructive security assessment that identifies vulnerabilities, models attack paths, and maps compliance gaps — all without exploitation.

Stage 1ReconnaissanceEndpoint & asset discoveryStage 2FingerprintingTech stack & version detectionStage 3Vulnerability ScanSSL, headers, CVE matchingStage 4Exploit ValidationNon-destructive detect-onlyPRO+Stage 5Attack Path ModelingGraph analysis & compliancePREMIUMAll testing is non-destructive and detect-only. No exploitation performed.

Free Tier

Passive reconnaissance and basic security checks

Stage 1: Reconnaissance

Endpoint discovery, link crawling, robots.txt analysis, and sitemap extraction.

Stage 2: Fingerprinting

Technology stack detection including web server, framework, and JavaScript library identification with version extraction.

Basic Vulnerability Scan

SSL/TLS certificate validation, HTTP security headers audit, CVE matching, and AI-generated security grade (A-F). Top 3 vulnerabilities shown.

Pro Tier$79/mo

Active scanning with Stage 3 exploit validation

Everything in Free, plus verified scope active scanning and 8 detect-only exploit validation modules:

SQL Injection Detection

Boolean/time-based detection only — no data extraction

Reflected XSS Detection

Harmless marker reflection check in response and DOM

Auth Misconfiguration

Checks for unprotected sensitive endpoints

IDOR Detection

Minimal ID variation with structure comparison

CVE Fingerprint Confirmation

Version-to-CVE correlation from local database

Object Storage Exposure

Permission probes on cloud storage buckets

Admin Panel Detection

Signature-based discovery of admin interfaces

TLS Misconfiguration

Handshake analysis for weak ciphers and protocols

Technical PDF ExportShare ReportsPrivate Scans

Premium Tier$199/mo

Full Stage 4 attack path modeling and compliance mapping

Attack Path Modeling

In-memory attack graph construction with BFS/DFS path ranking. Identifies the top attack chains from internet attacker to high-impact assets with step-by-step remediation priorities.

Compliance Mapping

Maps every finding to NIS2 (gap indicator only), ISO 27001 Annex A, SOC 2 Common Criteria, and NIST CSF with 1-2 line rationale per mapping.

Executive Reporting

AI-generated business risk summary with top risks, likely entry points, worst-case outcomes, and quick wins. Executive PDF export for leadership.

Remediation Roadmap

Prioritized remediation plan based on attack path analysis, severity, and business criticality. Template-based, deterministic output.

Technical PDF ExportExecutive PDF ExportShare ReportsPrivate ScansRun Agents on Your Infrastructure

What We Do and What We Do Not Do

What We Do

  • Non-destructive vulnerability detection
  • Passive reconnaissance and fingerprinting
  • Detect-only exploit validation (no data extraction)
  • Attack path modeling based on observed findings
  • Compliance gap indicators (NIS2, ISO 27001, SOC 2, NIST)
  • Structured, reproducible JSON outputs
  • Full audit trail of all scan operations

What We Do NOT Do

  • No remote code execution or shell access
  • No data extraction, dumping, or exfiltration
  • No privilege escalation attempts
  • No brute force or credential stuffing
  • No denial of service (DoS) attacks
  • No scanning outside verified scope
  • No compliance certification (gap indicators only)

Authorization Required: You must have explicit authorization to scan any target. AttackVector enforces strict scope verification. Scanning without authorization may violate applicable laws.

Asset Ownership Verification

Before any active scanning begins, you must prove ownership of the target asset. This is a mandatory step — AttackVector will never scan assets without verified authorization.

DNS TXT Challenge

Domains

Add a TXT record to your domain's DNS to prove ownership.

DNS TXT Record

_attackvector.yourdomain.com TXT "av-verify=<token>"

Reverse HTTP Challenge

IP Addresses

Host a verification file on the target server so we can confirm you control it.

Host this file

http://<IP>/.well-known/attackvector.txt

Signed Outbound Callback

IP Addresses

Run a signed curl command from the target server to confirm you have shell access to it.

Run on target

curl https://attackvector.tech/verify/<token>
RECOMMENDED

Lightweight Agent

IP Addresses

Deploy a minimal agent on the target that handles verification and provides a secure communication channel for deeper assessments.

One-line install

curl -sSL https://attackvector.tech/agent | sh -s <token>

Ready to Assess Your Security?

Start with a free scan or upgrade to Pro for full exploit validation.