AI-Supported Penetration Testing

Fully local. Fully secure. Fully automated.

Scroll to explore
01

Secure

Built with security as the foundation. All services run with TLS encryption, API key authentication, and network segmentation between public and internal services.

  • TLS encryption everywhere
  • Dual-key authentication (user + master)
  • Secure credential vault with Fernet encryption
  • Isolated pentest environments in tmpfs
02

Automated

Comprehensive penetration testing with blackbox, greybox, and whitebox methodologies. Powered by n8n workflows and Kali Linux integration.

  • OWASP Top 10 coverage
  • Automated vulnerability discovery
  • Human-in-the-Loop command approval
  • Customizable testing phases
03

Local AI

Leverage the power of local LLMs through Ollama. Your data never leaves your infrastructure. Connect multiple GPU hosts for distributed inference.

  • Ollama integration with any model
  • Qdrant vector database for context
  • NIST CVE lookup integration
  • Reverse SSH tunnels for remote GPUs
04

Collaborative

Work together with your security team. Share pentests with colleagues, manage permissions, and coordinate testing efforts seamlessly.

  • Shared pentest access with permissions
  • Queue management for Ollama instances
  • Team-based user management
  • Accept/reject sharing requests
05

Intelligent

Context-aware testing powered by AI. The system learns from provided information, findings and adapts its testing strategy for maximum coverage.

  • Context-aware vulnerability detection
  • Intelligent retesting with delta analysis
  • Automated regression testing
  • Smart command orchestration
06

Reports

Generate professional PDF reports with all findings. Edit vulnerabilities before export and share securely with password protection.

  • Comprehensive PDF export
  • Edit findings before generation
  • Password-protected sharing
  • Full audit trail
The Reality

AI isn't the future.
It's already here.

While some security teams debate whether to adopt AI, threat actors are already using it to automate reconnaissance, generate exploits, and scale their attacks. The gap between AI-enabled attackers and traditional defenders grows wider every day.

Speed matters

AI-assisted attackers move faster. Manual testing methodologies that worked five years ago now leave critical gaps in your security posture.

Adapt or fall behind

Security teams that integrate AI into their workflows don't just keep pace - they gain the advantage. Those who wait will find themselves perpetually catching up.

AI on your terms

PenLocal lets you harness AI power without compromising security. Your data stays local, your models stay private, and your team stays in control.

100% Data sovereignty - nothing leaves your infrastructure
24/7 Continuous testing capability
0 Cloud dependencies - runs entirely on your own hardware

"The question isn't whether AI will transform security testing. It's whether your team will be leading that transformation or scrambling to catch up."

Product Tour

See PenLocal in Action

A complete penetration testing platform built for modern security teams

01

Command Center Dashboard

Get a complete overview of all your penetration tests, vulnerabilities, and security assessments from a single, intuitive dashboard. Track progress, monitor findings, and manage your security workflow efficiently.

  • Real-time pentest status monitoring
  • Vulnerability severity breakdown
  • Quick access to recent tests
  • Team activity overview
02

Flexible Testing Modes

Choose from blackbox, greybox, or whitebox penetration testing methodologies. Each mode adapts the AI's approach based on the level of information available about your target systems.

  • Blackbox: Zero prior knowledge testing
  • Greybox: Partial system information
  • Whitebox: Full access and documentation
  • Customizable testing phases
03

Custom AI Agents

Create and deploy specialized AI agents for targeted security testing. Build dedicated agents for XSS detection, Kubernetes auditing, API testing, and more. Drag and drop agents to customize your pentest workflow.

  • Pre-built security-focused agents
  • Drag-and-drop agent orchestration
  • Create custom agent templates
  • Share agents across your team
04

Human in the Loop

Stay in control with command approval workflows. Review and approve every command before execution on your Kali Linux container. Full transparency and safety for your testing environment.

  • Approve or reject AI commands
  • Full command preview before execution
  • Queue management for pending actions
  • User-isolated SSH sessions
05

Local AI Infrastructure

Connect your own Ollama instances securely via HTTPS and API keys. Use reverse SSH tunnels over VPN for remote GPU access. Your data never leaves your infrastructure.

  • Secure HTTPS + API key authentication
  • SSH reverse tunnel support
  • Multiple Ollama host management
  • GPU load balancing
06

Vulnerability Management

Import findings from any PDF report and automatically extract vulnerabilities. Edit, categorize, and track vulnerabilities with a comprehensive management interface.

  • PDF report import with AI extraction
  • Inspect and edit vulnerability details
  • Enable verification workflows
07

Intelligent Retesting

Verify remediation efforts with targeted retests. Select specific vulnerabilities from previous pentests or imported reports and let the AI verify if they've been properly fixed.

  • Select vulnerabilities for retest
  • Delta analysis between tests
  • Automated regression testing
  • Clear pass/fail verification
08

Professional Reports

Generate comprehensive PDF reports ready for stakeholders. Includes executive summaries, risk matrices, detailed findings, and remediation recommendations.

  • Professional cover pages
  • Executive summary generation
  • Visual risk matrices
  • Detailed phase breakdowns
09

Team Collaboration

Share penetration tests, agents, templates, and findings with your team or specific individuals. Fine-grained permission controls ensure the right people have access to the right resources.

  • Share with teams or individuals
  • Permission-based access control
  • Accept/reject sharing requests
  • Collaborative testing workflows
Team Overview
10

Code Reviews

Perform dedicated source code reviews powered by AI. Upload your source code and let the AI analyze it for security vulnerabilities, coding flaws, and potential attack vectors with comprehensive findings.

  • Upload and analyze source code
  • AI-powered vulnerability detection
  • Security-focused code analysis
  • Detailed remediation suggestions
Code Review
11

Command Center

Get full context of executed pentest findings with quick actions at your fingertips. The Command Center provides a centralized view of all discoveries, letting you act on findings instantly without switching between views.

  • Centralized findings overview
  • Quick actions on discoveries
  • Real-time pentest context
  • Streamlined remediation workflow
12

Import Notes to Vulnerabilities

Transform your unstructured pentest notes into properly structured vulnerabilities. Import raw notes and let the AI parse and categorize them into standardized vulnerability entries with severity ratings, descriptions, and remediation steps.

  • Import unstructured notes
  • AI-powered structuring
  • Automatic severity classification
  • Standardized vulnerability format
13

Export Vulnerabilities to DOCX

Export your findings to professionally styled DOCX reports. Upload your own pentest report template and PenLocal will port the vulnerabilities using your organization's branding and formatting style automatically.

  • Export findings to DOCX format
  • Upload custom report templates
  • Automatic style matching
  • Organization branding support
Export Vulnerabilities to DOCX

Deployment

Choose the deployment that fits your infrastructure

High Performance
PenLocal Ollama GPU

PenLocal + Ollama

Deploy both services on the same high-performance host for maximum speed and simplicity.

  • High computing power required
  • GPU acceleration supported
  • Fastest inference times
  • Simple single-host setup
Flexible Deployment
PenLocal SSH Tunnel Ollama GPU

PenLocal Only

Run PenLocal on any system and connect to a remote Ollama instance via secure SSH tunnel.

  • No GPU required locally
  • Secure reverse SSH tunnels
  • Connect to remote GPU hosts
  • Flexible infrastructure

Built for security professionals

Connect your local Ollama instances and keep your data safe

PenLocal Server
Ollama Host 1
Ollama Host 2
Cloud Host

Reverse SSH Tunnels

Connect multiple local Ollama instances through secure tunnels.

Flexible Deployment

Run on NVIDIA, AMD, or Apple Silicon. Cloud or on-premises.

Data Sovereignty

All data stays within your infrastructure.

Under the Hood

Intelligent Agent Orchestration

See how our AI supervisor coordinates specialized agents for comprehensive penetration testing

Data Ingest
Pentest Start
Web Crawling
Network Scanning
Source Code Processor
Vector Database
Orchestration
Planner
  • Analyze collected data
  • Determine next phase
  • Prioritize targets
  • Define phase strategy
Supervisor
  • Review current state
  • Select agent by service
  • Choose goal & depth
  • Provide context
Execution
Agent
  • Execute methodology
  • Stop when goal achieved
  • Report vulns as found
  • Return structured findings
Subworkflows
Batch Executor
Human in the Loop
Report Vulnerability
CVE Agent
Summarizer
Engagement Complete

Context-Aware Testing

Each pentest builds its own vector database with crawled content, source code, and discovered information for intelligent context retrieval.

Intelligent Orchestration

The supervisor reviews findings, selects specialized agents based on discovered services, and continuously prioritizes the testing queue.

Specialized Agents

Each agent follows service-specific methodologies with configurable depth levels. Findings and leads automatically feed back into the queue.

Human in the Loop

Critical commands are queued for human approval. Review, modify, or reject any action before execution for complete control.

The complete pentester's toolbox

Everything you need for professional security assessments

Automated Testing

Comprehensive security testing with blackbox, greybox, and whitebox methodologies.

Local AI Power

Leverage local LLMs through Ollama. Your data never leaves your infrastructure.

Team Collaboration

Share pentests with colleagues and coordinate testing efforts.

Professional Reports

Generate comprehensive PDF reports with editable findings.

Intelligent Retesting

Track vulnerabilities with delta analysis and regression testing.

Security First

TLS everywhere, API key auth, and secure credential handling.

Ready to secure your infrastructure?

Get started with PenLocal in minutes

git clone https://github.com/secret/penlocal-ai && cd penlocal-ai && chmod +x install.sh && ./install.sh