Speed up reconnaissance and offensive workflows.
Sentinelle helps pentesters and bug bounty hunters focus on high-value targets instead of repetitive recon.
06 — From the field
Pentesters and builders,in their own words.
- 01Attack-path reasoning
I thought I was testing yet another scanner. Then I watched it chain logical steps, pivot, and push all the way to exploitation. It's the first time an agent actually felt like it was hunting.
TMTheo M.
Pentester · Independent researcher
- 02Continuous adaptation
What changes everything is the continuity. The agent doesn't just fire off a scan — it watches, adapts, and switches direction the moment it senses a lead.
LMLea M.
Security Engineer · Series A infra team
- 03Red-team leverage
We don't have the headcount for a full-time red team. With Sentinelle, we finally have a credible offensive layer running while we ship.
JRJulien R.
CTO · Seed-stage SaaS
- 04Less noise, more proof
The signal is clean. No flood of useless alerts — just exploitable attack paths with enough context to act on, fast.
NKNassim K.
Offensive researcher · Private lab
- 05Fewer false positives
Usually, security tools slow us down. Here, every alert felt like it actually deserved the team's attention. That's rare.
APAlice P.
Builder · Product + engineering
- 06Goes past first query
It's the first tool I felt actually wanted to understand the target, instead of just ticking boxes.
CSClara S.
Early adopter · Security-first startup
From brief to report, no detours.
A loop you can interrupt, redirect, re-prompt — Sentinelle is always one message away.
Define a target
A URL, a CIDR, a GraphQL schema. Scope is yours — Sentinelle stays in bounds.
- Scope
- api.target.com
- Rules
- No destructive payload · rate 30 r/s
- Auth
- Bearer · 2 tenants provided
Pick the plan that matches your hunting.
From your first mission to running pentests as a day job — every plan ships with the same agent and the same toolkit. You pay for usage, not for tools.
Test drive
Test Sentinel on your own assets.
- 3 missions / month · 1 concurrent · 30 min max
- Active recon + sandbox exploitation
- 300K AI tokens / mission
- 7-day findings retention
- Markdown / JSON export
- Sentinel trial watermark on exports
Hunter
Hunt bounties before anyone else maps the surface.
- 30 missions / month · 1 concurrent · 4h max
- 18 built-in playbooks (auth, JWT, IDOR, SSRF, OAuth, deser…)
- 1.5M AI tokens / mission
- 30-day findings retention
- Export JSON / CSV / Markdown / SARIF
- 3 saved scopes · 1 custom playbook of your own
Pro
Deliver consultant-grade engagements every week.
- 120 missions / month · 3 concurrent · 12h max
- All built-in playbooks + 10 of your own custom recipes
- 4M AI tokens / mission
- 1-year findings retention
- Full export + Sentinel-branded PDF report
- 15 saved scopes
Elite
Run a pentest firm under your own brand.
- 300 missions / month · 10 concurrent · 48h max
- All built-in playbooks + 100 of your own custom recipes
- 10M AI tokens / mission
- 3-year findings retention
- White-label PDF (your logo on every report)
- 100 saved scopes
- Data residency FR (option)
- 1-on-1 onboarding · priority compute
The $0 tier is for testing and evaluation. Paid plans are priced in USD, billed monthly. Cancel anytime.
Frequently asked questions
Everything you need to know before launching your first mission. Another question? The blog covers the rest.
Read the blogAI pentesting is an end-to-end offensive security audit executed by an autonomous agent that plans, runs and reports vulnerabilities with no human in the loop.
Yes — as long as you only target systems you are authorized to test. Sentinelle enforces a mission authorization gate before any scan.
Burp Suite is a manual attack proxy. Sentinelle is an autonomous agent that decides what to attack, runs the tools and writes the report — no human intervention after the initial scope.
You describe your perimeter in natural language; Sentinelle verifies ownership (DNS TXT for own assets, bug bounty token for platforms) before testing.
Mission data is hosted in the EU (Hostkey France + Supabase) and encrypted at rest. Reports belong to you and are purged according to your plan's retention.
Yes — Hunter, Pro and Elite plans include HackerOne and Bugcrowd integrations to pull your programs and launch Sentinelle on the declared scope.
Free is for trying it out, Hunter targets solo bug bounty hunters, Pro fits freelance pentesters with multiple clients, Elite is for intensive pros with long retention and advanced integrations.
No — Sentinelle augments the pentester by automating recon and the first wave of exploitation. Final validation and offensive creativity stay human.
Stop scanning. Start hunting.
Spin up your first autonomous mission in under a minute.
Journal
From the blog
Project Glasswing: Anthropic’s AI Found Over 10,000 Critical Vulnerabilities in One Month
ia-agents3 min read
10 Powerful Websites Every Internet User Should Know
outils3 min read
Figma AI: The Native AI Agent Transforming UI Design with Prompts
llm3 min read
OpenAI Daybreak: The AI Cybersecurity Platform That Wants to Automate Defense
ia-agents3 min read
Cursor Composer 2.5: The First Real Leap in AI Coding Agents?
ia-agents3 min read



