Fast and reliableinternal network
pentesting
in your browser

Meet the manual pentesting suite that has the tools you need already integrated with a user-friendly interface, running in your browser.

No backend. No cloud.

WHY CHOOSE US

octopwn 1

All the tools within one suite

Clients, scanners and other utilities are implemented in Python. They run on a unified framework, all bundled on top of Pyodide, running in Webassembly. In your browser. Proxy application is needed to support network-based operations.
octopwn 2

Fast setup and results

No installation needed and only one tool to learn - deploy quickly and start pentesting from your browser.
octopwn 3

Get your job done under any conditions

All essential scanners, clients, utilities and proxies are integrated on a single data platform. Hassle free pentesting even in monitored environments.
octopwn 4

Platform-agnostic

Pentest from any Chromium-based browser. It can be on Linux, Windows, your phone, a Tesla Model 3 or your fridge as well.

Get Community Edition

Try now
It’s free!

What you can do

Dependable
internal network
pentesting suite for your productivity, security and convenience

Easy data import and export

Move data in and out easily from nmap, Hashcat, Bloodhound, Masscan etc.
with automatic parsing of credentials and clients.

All data is stored encrypted in your browser

We do not store anything about how you use our product or what projects you do with it.
Your data is always stored encrypted in your browser.

Reporting made easier

Command / execute time stamping and logging done for you.

Full session save / restore

Continue easily from where you left off.

Deploy remotely through VPN

Our proxy application can be deployed on localhost and on remote systems as well.

Developed and hosted in Switzerland.

Pricing

Choose
your plan

Community

Free forever

Try now

Starter

449 €
199 €

/ year

until 31 Aug, 2024
Get started

Pro

recommended
499 €
249 €

/ year

until 31 Aug, 2024
Get started

Enterprise

Dedicated support
Free training
Consultancy services
Contact us

How you can learn more

Become
better
at pentesting

Featured video

Hacking from the Browser

Tamas Jos presents OctoPwn in action at Area41.

07/17/2022


Video

Spooky Authentication at a Distance

Tamas Jos Defcon talk on YT! "This project was years in the making and this was a big milestone :) Please, enjoy!"

9/15/2023

Watch Video
Latest article

Weirdness while parsing LSASS minidumps

LSASS encrypts user credentials using AES-CFB which means that most of the secret values can be decrypted using an incorrect IV...

06/01/2022

Read more
Article

Play with katz, get scratched

In this article I’ll show step-by-step how to recover credentials even when paloalto’s Cortex XDR is “actively protecting” LSASS...

11/6/2020

Read more

Feel free
to joinour open
community

Made with love in Switzerland. Hack safely, always use Octopwn.
All rights reserved. - Octopwn - 2024
ver: xm8ufuh