Pricing
Security Tools That Scale
With Your Team
From solo researchers to enterprise security operations — choose the plan that fits your workflow. Start free, no credit card required.
Free
$0/forever
Get started with core vulnerability management — no strings attached.
- 1 user
- 2 workspaces
- 15 assets per workspace
- 50 MB storage
- Vulnerability management
- Scanner imports
- Basic OSINT tools
- Asset & vulnerability data exports
- 3 reports per month
Most Popular
Premium
$49/per month
Everything your security team needs in one encrypted workspace.
- Unlimited workspaces
- 5,000 assets per workspace
- 10 GB encrypted storage
- Vulnerability management
- All import formats (Nessus, OpenVAS, ZAP, Burp, BloodHound, WingSpan)
- Compliance auditing (NIST CSF 2.0)
- Full OSINT suite (Data Breach Lookup, WHOIS, Shodan, DNS Records)
- AI security assistant
- Integrated agent scanning
- Team workspaces with real-time chat
- Network map generation
- Asset, vulnerability & compliance data exports
- Unlimited reports with custom branding
- Priority support
Self-Hosted
$2,500/per year
Full control on your infrastructure with every feature unlocked.
- All Premium features
- Integrated scanning
- AI automated penetration testing
- Local AI optional
- Offline & air-gapped operation
- Optional encrypted AWS storage
- Your infrastructure, your data
- NDA-compliant deployment
- Dedicated support channel
Compare Plans
See exactly what's included in each plan — no hidden fees, no surprises.
| Feature | Free | Premium | Self-Hosted |
|---|---|---|---|
| Core Platform | |||
| Workspaces | 2 | Unlimited | Unlimited |
| Assets per workspace | 15 | 5,000 | Unlimited |
| Storage | 50 MB | 10 GB | Your infrastructure |
| Reports per month | 3 | Unlimited | Unlimited |
| Custom report branding | Not included | Included | Included |
| Vulnerability Management | |||
| Vulnerability tracking (CVSS, CVE, CWE) | Included | Included | Included |
| Multi-asset vulnerability linking | Included | Included | Included |
| Remediation tracking | Not included | Included | Included |
| Findings template library | Not included | Included | Included |
| Scanning & Imports | |||
| Scanner result imports | Included | Included | Included |
| All import formats (Nessus, OpenVAS, Burp, ZAP, BloodHound, WingSpan) | Not included | Included | Included |
| Integrated agent scanning | Not included | Included | Included |
| Integrated scanning | Not included | Not included | Included |
| OSINT & Reconnaissance | |||
| WHOIS lookup | Included | Included | Included |
| DNS record lookup | Included | Included | Included |
| Shodan integration | Not included | Included | Included |
| Data breach lookup (HIBP) | Not included | Included | Included |
| GeoIP lookup | Not included | Included | Included |
| Compliance & Auditing | |||
| NIST CSF 2.0 assessment | Not included | Included | Included |
| Gap analysis & evidence management | Not included | Included | Included |
| Compliance data exports | Not included | Included | Included |
| Collaboration | |||
| Team workspaces (RBAC) | Not included | Included | Included |
| Real-time chat | Not included | Included | Included |
| Network map generation | Included | Included | Included |
| AI & Automation | |||
| AI security assistant | Not included | Included | Optional (local LLM) |
| AI automated penetration testing | Not included | Not included | Optional (local LLM) |
| Data Exports | |||
| Asset data exports (CSV, JSON) | Included | Included | Included |
| Vulnerability data exports | Included | Included | Included |
| Security & Encryption | |||
| AES-256-GCM encryption at rest | Included | Included | Included |
| Per-workspace encryption keys | Included | Included | Included |
| Optional AWS S3 storage | Not included | Not included | Included |
| Deployment | |||
| Cloud hosted | Included | Included | Not included |
| Self-hosted / air-gapped | Not included | Not included | Included |
Frequently Asked Questions
Ready to Secure Your Assessments?
Start with our free tier — no credit card required.