Find real vulnerabilities.
Prove real impact.

Darkmoon orchestrates 18 specialized AI agents across your entire attack surface — web, APIs, cloud, Active Directory, Kubernetes — and delivers live findings, interactive infra graphs, and publication-ready reports.

18
Specialized AI agents
80+
Integrated pentest tools
Live
Dashboard & SSE streaming
AES-256
Sealed runtime encryption
/ why Darkmoon

Not a scanner.
An autonomous security conductor.

Darkmoon reasons about your target, models the attack surface, and dispatches the right agents — sequentially or in parallel — with full cascade control.

Multi-agent dispatch engine

The master agent detects 14 technology signals and routes the campaign to the right specialists. Cascade depth capped at 3 levels — no runaway recursion.

Real-time campaign visibility

Every finding, infrastructure node, and agent event is streamed live to the dashboard via SSE. You watch the pentest unfold as it happens.

Publication-ready outputs

ISO 27001, HackerOne, Bugcrowd, or custom formats. Markdown + branded PDF with CVSS, MITRE ATT&CK mapping, evidence, and remediation — auto-generated.

/ how it works

Five stages.
One autonomous pipeline.

Target intake

Enter a URL, IP, or scoped program. Darkmoon parses scope flags, credentials, noise level, severity threshold, and engagement rules.

Recon & surface mapping

Subfinder, httpx, katana, whatweb, wafw00f, and naabu build a complete picture: subdomains, ports, services, technologies, WAFs.

Agentic validation

Specialized agents test attack paths, pivot when justified, and push confirmed findings with full evidence to the live campaign.

Live dashboard push

Infrastructure nodes and vulnerabilities stream to the dashboard in real time. The infra graph updates as the topology is discovered.

Structured report

Executive summary, risk score, CVSS vectors, MITRE ATT&CK IDs, ISO 27001 controls, remediation logic — Markdown and branded PDF.

/ dashboard

One command center. Full operational clarity.

Live campaigns, vulnerability history, infrastructure graphs, risk scores — everything surfaced in a purpose-built dark dashboard.

/ Offers

Choose your plan

Security for everyone. Complexity for no one.

open
source

Open-Source for personal
& educational use.

FREE
  • Darkmoon tick ok
    Full CLI toolbox (50+ tools)
  • Darkmoon tick ok
    Autonomous AI agents
  • Darkmoon tick ok
    Community-driven updates
  • Darkmoon tick ok
    Self-hosted & open source
  • No commercial use
Get started free

enterprise

We build what your
mission demands.

Let's Talk
  • Darkmoon tick ok
    Everything in Pro
  • Darkmoon tick ok
    Tailored agents & custom integrations
  • Darkmoon tick ok
    Air-gapped & sovereign deployment
  • Darkmoon tick ok
    SLA & dedicated pentest experts  
GET STARTED
/ AI agents

18 specialists.
One orchestrator.
Zero manual pivoting.

The master agent detects your target's technology stack and dispatches the right specialists automatically. Each agent is a domain expert with its own attack playbook.

pentest (orchestrator)
wordpress
graphql
headless-browser
nodejs-express-angular
nestjs / nextjs
flask / django
aspnet / blazor
spring boot
ruby on rails
php / laravel
drupal
joomla
moodle
magento
prestashop
kubernetes (14 phases)
active directory (8 phases)
Full-stack web exploitation

SQLi, XSS (reflected/stored/DOM), SSRF, IDOR, RCE, SSTI, deserialization, JWT abuse, file upload, path traversal — validated with real payloads, not just signatures.

Kubernetes — 14 phases

RBAC escalation, DIND exploitation, node escape, etcd SSRF, privilege container breakout, crypto miner detection, Helm Tiller abuse, CIS benchmark via kube-bench.

Active Directory — 8 phases

AS-REP roasting, Kerberoasting, BloodHound collection, NTLM relay, LSASS dump, DCSync, ADCS ESC1-ESC8, Golden/Silver ticket, pass-the-hash / pass-the-ticket.

/ TOOLBOX

80+ integrated tools. Coordinated, not dumped.

Darkmoon wraps the industry-standard offensive security toolkit inside an AI orchestration layer that knows when and how to use each tool.

/ Recon & Discovery
subfinder
httpx
naabu
katana
waybackurls
whatweb
wafw00f
finalrecon
cmseek
wpscan
nuclei
ffuf
dirb
arjun
/ Exploitation & Post-exploitation
sqlmap
hydra
hashcat (GPU)
netexec
bloodhound-python
impacket suite
mimikatz
secretsdump
psexec
kubectl
kubeletctl
kubescape
lightpanda
playwright
/ Report formats
ISO 27001 Standard
HackerOne (H1)
Bugcrowd (VRT / P1–P5)
Custom format
Mermaid diagrams
Branded PDF (pdfmake)
MITRE ATT&CK mapping
CVSS 3.1 scoring
/ FAQ

Questions security teams ask first.

How is Darkmoon different from a vulnerability scanner?

Darkmoon orchestrates an end-to-end offensive campaign — it reasons about target type, dispatches domain specialists, validates findings with real payloads, builds an infrastructure graph, and produces a structured report. A scanner runs one-pass signatures. Darkmoon runs a pentest.

What happens during a live campaign?

You watch it happen. Every agent event, tool call, finding, and infrastructure discovery streams to the dashboard in real time via SSE. The infra graph and vulnerability list update as the campaign progresses.

Can I schedule recurring assessments?

Yes. The built-in scheduler supports one-time, daily, weekly, and monthly recurrences with configurable intervals. All campaign parameters — scope, credentials, noise level, format — are preserved per scheduled entry.

What report formats does Darkmoon produce?

ISO 27001 standard, HackerOne, Bugcrowd (VRT / P1–P5), and custom format. All reports include CVSS 3.1 scoring, MITRE ATT&CK mapping, ISO 27001 controls, raw evidence, and remediation guidance. PDF export includes a branded cover page and is password-protected.

How does the licensing work?

Darkmoon uses hardware-bound licensing via Cryptolens. Your licence key is tied to a machine fingerprint derived from your hardware (MAC address, CPU model) — it cannot be cloned or moved to another machine by changing an environment variable.

Is the platform safe to run in production environments?

Darkmoon includes configurable noise levels (stealth / low / moderate), safe harbor mode, out-of-scope enforcement, and per-agent scope propagation. The runtime is hardened with a read-only filesystem, seccomp, no-new-privileges, and continuous watchdog checks.