SKJDMRAL
+8

Speed up reconnaissance and offensive workflows.

Sentinelle helps pentesters and bug bounty hunters focus on high-value targets instead of repetitive recon.

Built on the tools you already trust
OWASPMITRE ATT&CKCVEBurp SuiteNmapOWASP ZAPNucleiMetasploitWiresharkOWASPMITRE ATT&CKCVEBurp SuiteNmapOWASP ZAPNucleiMetasploitWireshark
sqlmapffufhashcatKali LinuxBashcurlHackTheBoxTryHackMesqlmapffufhashcatKali LinuxBashcurlHackTheBoxTryHackMe

06 — From the field

Pentesters and builders,in their own words.

  • 01Attack-path reasoning
    I thought I was testing yet another scanner. Then I watched it chain logical steps, pivot, and push all the way to exploitation. It's the first time an agent actually felt like it was hunting.
    TM

    Theo M.

    Pentester · Independent researcher

  • 02Continuous adaptation
    What changes everything is the continuity. The agent doesn't just fire off a scan — it watches, adapts, and switches direction the moment it senses a lead.
    LM

    Lea M.

    Security Engineer · Series A infra team

  • 03Red-team leverage
    We don't have the headcount for a full-time red team. With Sentinelle, we finally have a credible offensive layer running while we ship.
    JR

    Julien R.

    CTO · Seed-stage SaaS

  • 04Less noise, more proof
    The signal is clean. No flood of useless alerts — just exploitable attack paths with enough context to act on, fast.
    NK

    Nassim K.

    Offensive researcher · Private lab

  • 05Fewer false positives
    Usually, security tools slow us down. Here, every alert felt like it actually deserved the team's attention. That's rare.
    AP

    Alice P.

    Builder · Product + engineering

  • 06Goes past first query
    It's the first tool I felt actually wanted to understand the target, instead of just ticking boxes.
    CS

    Clara S.

    Early adopter · Security-first startup

02 — Workflow

From brief to report, no detours.

A loop you can interrupt, redirect, re-prompt — Sentinelle is always one message away.

01 · Step

Define a target

A URL, a CIDR, a GraphQL schema. Scope is yours — Sentinelle stays in bounds.

Scope
api.target.com
Rules
No destructive payload · rate 30 r/s
Auth
Bearer · 2 tenants provided
03 — Pricing

Pick the plan that matches your hunting.

From your first mission to running pentests as a day job — every plan ships with the same agent and the same toolkit. You pay for usage, not for tools.

Test drive

Test Sentinel on your own assets.

$0to try
Start testing
  • 3 missions / month · 1 concurrent · 30 min max
  • Active recon + sandbox exploitation
  • 300K AI tokens / mission
  • 7-day findings retention
  • Markdown / JSON export
  • Sentinel trial watermark on exports

Hunter

Hunt bounties before anyone else maps the surface.

$79/ month
Start hunting
  • 30 missions / month · 1 concurrent · 4h max
  • 18 built-in playbooks (auth, JWT, IDOR, SSRF, OAuth, deser…)
  • 1.5M AI tokens / mission
  • 30-day findings retention
  • Export JSON / CSV / Markdown / SARIF
  • 3 saved scopes · 1 custom playbook of your own

Elite

Run a pentest firm under your own brand.

$700/ month
Go Elite
  • 300 missions / month · 10 concurrent · 48h max
  • All built-in playbooks + 100 of your own custom recipes
  • 10M AI tokens / mission
  • 3-year findings retention
  • White-label PDF (your logo on every report)
  • 100 saved scopes
  • Data residency FR (option)
  • 1-on-1 onboarding · priority compute

The $0 tier is for testing and evaluation. Paid plans are priced in USD, billed monthly. Cancel anytime.

Questions fréquentes

Tout ce qu'il faut savoir avant de lancer votre première mission. Une autre question ? Le blog couvre le reste.

Lire le blog

Un pentest par IA est un audit de sécurité offensif réalisé de bout en bout par un agent autonome qui planifie, exécute et rapporte les vulnérabilités sans pilotage humain en boucle.

Oui, à condition de cibler uniquement des systèmes que vous êtes autorisé à auditer. Sentinelle impose une mission authorization gate avant tout scan.

Burp Suite est un proxy d'attaque manuel. Sentinelle est un agent autonome qui prend la décision d'attaque, lance les outils et rédige le rapport — sans intervention humaine après le scope initial.

Vous décrivez votre périmètre en langage naturel ; Sentinelle vérifie la propriété (DNS TXT pour own asset, jeton bug bounty pour les plateformes) avant tout test.

Les données de mission sont hébergées en UE (Hostkey France + Supabase) et chiffrées au repos. Les rapports vous appartiennent et sont purgés selon votre rétention de plan.

Oui — les plans Hunter, Pro et Elite incluent des intégrations HackerOne et Bugcrowd pour aspirer vos programmes et lancer Sentinelle directement sur le scope déclaré.

Free permet de tester, Hunter cible le bug bounty hunter solo, Pro le pentester freelance avec plusieurs clients, Elite le pro intensif avec rétention longue et intégrations avancées.

Non — Sentinelle augmente le pentester en automatisant la recon et la première vague d'exploitation. La validation finale et la créativité offensive restent humaines.

Stop scanning. Start hunting.

Spin up your first autonomous mission in under a minute.