We are rethinking cybersecurity through offensive AI
Powered by ASC-IT, Darkmoon designs an offensive AI capable of replacing manual slopes, identifying critical flaws in real-time, and generating patches even before an attack occurs.
Powered by ASC-IT, Darkmoon designs an offensive AI capable of replacing manual slopes, identifying critical flaws in real-time, and generating patches even before an attack occurs.
Darkmoon was created to address a simple but factual issue: attacks become faster, more stealthy, more frequent – so why are cybersecurity audits always slow, expensive and manual ?
Our mission is to make cybersecurity accessible and participate in a digital world more safe.

Darkmoon was born from the meeting between two worlds: that of experts in offensive cybersecurity and that of artificial intelligence engineers. With several years of operational experience in penetration testing (pentest) in critical environments – especially for large European groups and technological startups – we have observed the structural limits of traditional approaches: too long delays, human dependence, high costs, incomplete coverage.
Faced with an increasingly hostile digital environment, we had to rethink the standards. So we designed Darkmoon: an automated slopest solution, capable of reproducing realistic, contextualized and multi-vector attacks, with the speed, precision and scalability of AI.
Our vision? Offer all organizations, in France and abroad, simple, fast and continuous access to offensive cybersecurity, without compromising on quality, expertise or compliance.
Thanks to Darkmoon you don't react to threats, you're ahead of them
Our technology is designed for SMEs and large groups.
We meet the standards of compliance (RGPD, NIS2, ISO 27001).
Clear reports, open API, verifiable results. No black box.
No — DarkMoon augments your team's capabilities. It automates reconnaissance, scanning, and exploitation phases, freeing your experts to focus on strategic analysis and remediation. It's an autonomous orchestrator, not a human substitute.
Web applications, APIs, Active Directory, Kubernetes, CMS platforms (WordPress, Drupal, Joomla...), networks, and cloud infrastructure. Agents automatically adapt to the technologies detected on the target.
A complete, structured report is delivered in under 2 hours after the test is launched — compared to 2 to 6 weeks for a traditional audit.
No. A single command is enough to launch a full security assessment. The Pro plan adds a visual dashboard and project management interface for non-technical teams
Yes. DarkMoon can be triggered automatically after every build to detect critical vulnerabilities before they ever reach production.
Every discovered vulnerability is validated with real evidence — HTTP requests, payloads, and server responses — before it appears in the report. Zero ambiguity, zero noise.
Yes, within an authorized scope. DarkMoon is designed to test targets you own or for which you hold explicit written authorization. Any use outside the defined scope is the sole responsibility of the user.
Yes. The Custom plan supports fully isolated deployments for sovereign, defense, and highly regulated environments with no internet connection required.