No — DarkMoon augments your team's capabilities. It automates reconnaissance, scanning, and exploitation phases, freeing your experts to focus on strategic analysis and remediation. It's an autonomous orchestrator, not a human substitute.
Web applications, APIs, Active Directory, Kubernetes, CMS platforms (WordPress, Drupal, Joomla...), networks, and cloud infrastructure. Agents automatically adapt to the technologies detected on the target.
A complete, structured report is delivered in under 2 hours after the test is launched — compared to 2 to 6 weeks for a traditional audit.
No. A single command is enough to launch a full security assessment. The Pro plan adds a visual dashboard and project management interface for non-technical teams
Yes. DarkMoon can be triggered automatically after every build to detect critical vulnerabilities before they ever reach production.
Every discovered vulnerability is validated with real evidence — HTTP requests, payloads, and server responses — before it appears in the report. Zero ambiguity, zero noise.
Yes, within an authorized scope. DarkMoon is designed to test targets you own or for which you hold explicit written authorization. Any use outside the defined scope is the sole responsibility of the user.
Yes. The Custom plan supports fully isolated deployments for sovereign, defense, and highly regulated environments with no internet connection required.