Software
Breachwright
Get in Touch
Now Available — v1.7.2

AI-powered pentest management
for security professionals

Upload scans. Generate findings. Analyze AD attack paths. Produce client-ready reports. Breachwright replaces your spreadsheets, note apps, and report templates with one tool.

Now with Moxie — an offensive security AI assistant included with Professional. No API key required.

Download Community EditionView Pricing
Breachwright // Advent Cybersecurity
$ breachwright
┌──────────────────────────────────────────┐
BREACHWRIGHT v1.7.2
│ Server running on 127.0.0.1:13370
└──────────────────────────────────────────┘
 
[✓] Uploaded nmap_scan.txt (7 ports open)
[✓] AI Analysis: 2 critical, 3 high, 4 medium findings
[✓] Imported SharpHound: CORP.LOCAL (847 objects)
[✓] AD Paths: 3 paths to Domain Admin
[✓] Report generated: pentest_report.docx
 
Ready. Upload scans, ask the AI, generate reports.

Five minutes from scan to report

01

Upload Scans

Nmap, Nessus, Burp output. Or run tools from the built-in Tool Runner.

02

AI Analyzes

Findings generated with severity, CVSS scores, and remediation guidance.

03

Review & Edit

Edit findings, attach evidence, track retest status. Full control.

04

Generate Report

Professional DOCX with cover page, severity tables, and formatted findings.

Everything a pentester needs

Built by pentesters, for pentesters. Not another vulnerability scanner.

AI Scan Analysis

Upload nmap, Nessus, or Burp output. AI generates findings with severity ratings, CVSS scores, affected hosts, and specific remediation steps.

Active Directory Analysis

Import SharpHound/BloodHound ZIP files. AI identifies attack paths to Domain Admin — Kerberoasting chains, ACL abuse, delegation attacks, and more.

DOCX Reports

Professional pentest reports with cover page, executive summary, severity tables, and detailed findings. Client-ready in one click.

Tool Runner

Execute nmap, subfinder, httpx, nikto, feroxbuster, and gowitness as background jobs. Live output streaming. Results pipe into AI analysis.

Exploitation Chains

AI maps how your findings connect into realistic attack scenarios. Shows target hosts, step-by-step techniques, and chained impact.

AI Assistant

Context-aware chat that pulls your engagement data. Ask "what should I remediate first?" and get answers based on your actual findings.

Plans for every operator

Free to start. Upgrade when you need the full toolkit.

Community
Free
For learning and small engagements
  • Up to 2 engagements
  • 20 findings per engagement
  • Manual finding management
  • Markdown reports
  • AI Assistant (bring your own API key)
  • AI scan analysis
  • DOCX reports
  • Exploitation chains
  • Moxie AI
  • Tool Runner
  • AD analysis
Download Free
Professional
$499/yr
$41.58/mo · Up to 5 seats · Save 15%
  • Unlimited engagements
  • Up to 5 seats
  • AI scan analysis
  • Moxie AI (no API key needed)
  • Exploitation chains
  • Attack narratives (MITRE ATT&CK)
  • Active Directory analysis
  • DOCX reports
  • Tool Runner (nmap, nikto, etc.)
  • AI Assistant
  • Evidence attachments
  • Export/Import
  • Custom AI prompts
  • Cross-engagement intelligence
  • Methodology gap detection
  • Local model support (Ollama/vLLM)
FeatureCommunityProfessional
Engagements2Unlimited
Findings per engagement20Unlimited
Seats1Up to 5
Manual findings
Markdown reports
AI Assistant (BYOK)
AI scan analysis
DOCX reports
Exploitation chains
Attack narratives (MITRE ATT&CK)
Moxie AI (no API key needed)
Tool Runner (nmap, nikto, etc.)
Evidence attachments
Export/Import
Custom AI prompts
Active Directory analysis
Cross-engagement intelligence
Methodology gap detection
Local model support (Ollama/vLLM)
Existing Customer

Manage Subscription

Update your payment method, change plans, or cancel your subscription.

Stop writing reports from scratch

Download the Community Edition and run your first scan analysis in five minutes.

Download for LinuxDownload for Windows
SHA256 — Linux
7400042bd4694dc6cd462f9bfd506149487c7f90e7663ea4eef648fb6a49db56
SHA256 — Windows
c3d3cc36c62b76b124c7265643038d6d7ebd478454686f2ce6dbf99e2e37d43a

First-run setup happens in the app — no terminal commands needed.

Linux
$ tar xzf breachwright-1.7.2-linux-x64.tar.gz
$ cd Breachwright && ./install.sh
$ breachwright
 
[✓] Server running on 127.0.0.1:13370
Windows
1. Extract breachwright-1.7.2-windows-x64.zip
2. Run install-windows.bat
3. Launch from Start Menu or Desktop
 
[✓] Ready