Proprietary PTaaS Platform

The Platform Behind Every Assessment

Our proprietary platform manages the entire penetration testing lifecycle — from deal scoping to client delivery. It automates the busywork so our consultants focus on finding vulnerabilities.

End-to-End Workflow

The Complete Assessment Lifecycle

Every step tracked, audited, and optimized — from the first client conversation to remediation verification.

Step 01

Deal Scoping

Built-in pricing engine with sublinear scaling across 17 assessment types. Scope engagements in minutes, not hours.

Step 02

Project Setup

One-click deal-to-project conversion creates fully configured projects with assessments, targets, and personnel assignments.

Step 03

Scope Definition

Define IPs, domains, URLs, and hostnames. Auto-generate tool-specific scope files for Nmap, Nuclei, and more.

Step 04

Automated Scanning

Orchestrate Nmap, Nuclei, Amass, httpx, and Dehashed through production-grade Airflow pipelines with scheduled execution.

Step 05

Finding Documentation

Document findings from 500+ templates with CVSS scoring, evidence management, and inline panel editing.

Step 06

AI-Assisted Quality Review

In addition to human peer review, sanitized reports are reviewed by multi-model AI (Claude, GPT, Gemini) for typos, accuracy, and severity mismatches — producing a 0-100 quality score.

Step 07

Peer Review

Structured 5-question reviews with threaded comments, multi-round tracking, and configurable delivery gates.

Step 08

Report Generation

Generate DOCX, PDF, CSV, and web reports from a single source of truth with severity charts and professional formatting.

Step 09

Secure Delivery

Time-limited tokenized download links with access tracking, expiration controls, and instant revocation.

Step 10

Remediation & Retest

End-to-end retest workflow: request → assign → claim → verify → complete. Track verification evidence and status.

Capabilities

309+ Features Across 25 Capability Areas

Scan Orchestration

  • Nmap port scanning (top-N or custom)
  • Nuclei vulnerability scanning
  • Amass & Chaos subdomain enumeration
  • httpx HTTP probing & tech fingerprinting
  • Dehashed breach data lookup
  • Scheduled daily/weekly/monthly scans
  • Live WebSocket log streaming

AI-Assisted Quality Review

  • Supplements human peer review — never replaces it
  • Multi-model support (Claude, GPT, Gemini, Grok)
  • 0-100 quality score per report
  • Typo, grammar, and consistency checks
  • Severity mismatch detection
  • Missing content identification
  • Consultant severity calibration analysis

Reporting Engine

  • DOCX with severity charts & hyperlinks
  • PDF export
  • CSV data export
  • Web-based interactive report
  • Multi-assessment combined reports
  • Professional formatting & templates
  • DOCX round-trip import/export

Findings Knowledge Base

  • 500+ curated finding templates
  • Pre-written descriptions & recommendations
  • CVSS 3.1 + 4.0 scoring
  • Nessus plugin ID auto-mapping
  • Severity ratings & categorization
  • Team knowledge accumulation
  • Drag-and-drop finding ordering

JIRA Integration

  • One-click export to JIRA tickets
  • Severity-to-priority mapping
  • Evidence image attachments
  • Epic creation support
  • HTML-to-JIRA markup conversion
  • Sync tracking for changed findings
  • Per-organization JIRA configuration

Security & Compliance

  • MFA with device trust
  • Account lockout protection
  • Role-based access control
  • Field-level audit changelog
  • Before/after diff tracking
  • SOC 2 and PCI DSS audit support
  • Secure tokenized report sharing

Smart Toolbox

  • Auto-resolve IPs ↔ hostnames across scope
  • Import breach data for password spraying campaigns
  • Auto-generate tool-specific scope files (Nmap, Nuclei, etc.)
  • Finding instances with per-instance severity & CVSS
  • Nessus plugin ID → finding template auto-matching
  • Bulk finding copy between assessments
  • Evidence command output with syntax highlighting

Asset Inventory & Discovery

  • Complete host inventory (IPs, ports, services, protocols)
  • Subdomain enumeration (Amass + Chaos)
  • HTTP probing with tech fingerprinting
  • Service version detection across all targets
  • Smart endpoint merging from multiple scans
  • In-scope vs. out-of-scope host classification
  • Reverse DNS tracking

Breach Data & OSINT

  • Automated per-domain breach lookups (Dehashed)
  • Telegram/ClickHouse breach import
  • Smart deduplication of breach records
  • Structured email, username, password, hash extraction
  • Username enumeration across breach sources
  • Dedicated breach report export
  • In-app breach results browser

How We Compare

Our platform-powered approach delivers capabilities that DOCX-based firms and even dedicated pentest platforms can't match.

CapabilityTrustFoundryDOCX-Based FirmsOther Platforms
Deal scoping & pricing engine
Automated scan orchestration
AI-assisted quality reviewPartial
DOCX round-trip import/exportManualPartial
Finding instances with per-instance CVSSPartial
Breach data import & OSINT
Auto-generated scope files for tools
500+ finding knowledge basePartial
Multi-round peer review workflowPartial
Full field-level audit changelogPartial
Secure tokenized report sharing
JIRA export with sync tracking
Built-in CVSS 3.1 + 4.0 scoring
Asset inventory & service detectionPartial

“DOCX-Based Firms” = companies using Word/Google Docs and spreadsheets. “Other Platforms” = general-purpose pentest management tools.

Integrated Tools & Services

Security tools orchestrated through production-grade pipelines, plus the integrations that tie everything together.

Security Tools

NmapNucleiNessusAmassChaoshttpxDehashedBurp Suite

Platform Integrations

JIRASlackApache AirflowMetabaseOpenRouter (Claude, GPT, Gemini, Grok)LibreOfficeAWS S3

Experience the Difference

See why organizations choose TrustFoundry's platform-powered pentesting over traditional assessment firms.