Beyond surface scanning. PhantomYerra ships with specialized engines for attack techniques that most tools ignore entirely. Every module runs through the Adaptive Attack Loop with full 8-level bypass escalation.
🔄
Adaptive Attack Loop
8-level bypass escalation on every payload. Send, analyze, learn, adapt, retry until confirmed or exhausted.
🔗
Cross-Endpoint Learning
Intelligence from one endpoint informs attacks on all others. Shared WAF fingerprints, tech stack, and bypass patterns.
🛡️
8-Level Bypass Escalation
Direct, encoded, fragmented, semantic, blind, protocol, chained, and AI-crafted bypass strategies per vulnerability class.
⛓️
Finding Chain Engine
Automatically chains findings into full attack paths: SQLi to credentials to admin to RCE. Proves real business impact.
📡
Request Smuggling Detection
CL.TE, TE.CL, and TE.TE desync testing against reverse proxies, load balancers, and CDN edge layers.
📁
File Upload Testing
Extension bypass, MIME mismatch, polyglot payloads, content-type sniffing, and webshell drop with confirmation.
🔑
JWT Attack Module
Algorithm confusion, none bypass, key brute-force, claim tampering, JKU/X5U injection, and token replay attacks.
⏱️
Race Condition Testing
Concurrent request timing attacks against payment flows, coupon redemption, account creation, and state-changing operations.
🌐
CORS Scanner
Origin reflection, null origin bypass, subdomain wildcard, credential leakage, and preflight misconfiguration testing.
🔌
WebSocket Security
Cross-Site WebSocket Hijacking, message injection, origin validation bypass, and upgrade request manipulation.
🔐
OAuth2 / OIDC Testing
Authorization code theft, PKCE bypass, token leakage, open redirect in callback, and scope escalation attacks.
📅
Scan Scheduling
Schedule recurring assessments against any target. Daily, weekly, or custom cadence with automatic differential reporting.
📋
Vulnerability Lifecycle
Track findings from discovery through remediation verification. Status tracking, SLA enforcement, and retest automation.
🗺️
MITRE ATT&CK Mapping
Every finding automatically mapped to MITRE ATT&CK tactics, techniques, and sub-techniques. Full kill chain visualization.
🎫
Jira / ServiceNow
Push confirmed findings as tickets with full evidence, CVSS scores, and remediation guidance. Bi-directional sync.
📊
SIEM Integration
Stream findings and scan events to Splunk, Elastic, Sentinel, and QRadar in real-time. CEF, syslog, and JSON formats.
☕
Java Bytecode Decompiler
Pure-Python .class and .jar decompiler. Reconstructs source from bytecode — control flow, exception tables, generics, lambdas. No external binaries.
🔷
.NET IL Decompiler
Pure-Python PE/DLL disassembler. Parses CLI metadata, reconstructs C# from MSIL opcodes, resolves type references. Zero dependencies.
🤖
Android APK Analyzer
Full APK teardown — manifest parsing, Dalvik DEX disassembly, cert pinning bypass detection, hardcoded secret extraction, exported component analysis.
🧬
YARA Rule Engine
Built-in YARA rule parser and matcher — no C extension required. Hex patterns, regex, conditions, modules. Ship and run YARA rules anywhere.
🔧
Firmware Extractor
Extract and analyze embedded firmware — filesystem carving, entropy analysis, hardcoded credential detection, crypto key extraction. Pure Python.
🎯
Custom SAST Rules
PhantomYerra-authored 144-rule Semgrep pack covering 11+ languages (Python, JavaScript, TypeScript, Java, Kotlin, Go, C, C++, C#, Ruby, PHP, Rust, Swift) — injection, deserialization, crypto misuse, hardcoded secrets, race conditions, supply-chain, auth chain, deserialization gadgets, taint propagation. Auto-triage by severity. Plus 7-engine zero-day suite (interprocedural taint, race detector, crypto oracle, auth chain, deser gadgets, supply chain, AI zero-day).
🔮
GraphQL Security Testing
Introspection bypass, depth-limit attacks, batch query abuse, alias-based DoS, field suggestion enumeration, and authorization bypass testing.
📡
gRPC Security Scanner
Server reflection enumeration, auth metadata injection, message fuzzing, unary/streaming method testing, and protobuf payload manipulation.
📨
SOAP/XML Service Testing
WSDL parsing, XXE injection, XPath injection, SOAPAction spoofing, WS-Security bypass, and XML signature wrapping attacks.
💉
Deserialization Attacks
Java, .NET, Python, PHP, Ruby, and YAML gadget chain detection. 50+ known gadget chains, custom payload generation, blind confirmation.
🧪
Prototype Pollution
__proto__ injection, constructor.prototype pollution, deep merge exploitation, client-side and server-side detection with confirmed impact.
⚡
HTTP/2 Attack Module
H2.CL request smuggling, HPACK bomb detection, rapid reset (CVE-2023-44487), stream multiplexing abuse, and HTTP/2 downgrade attacks.
🗄️
Cache Poisoning Engine
Unkeyed header injection, fat GET abuse, web cache deception, parameter cloaking, and CDN-level cache poisoning via host header manipulation.
🌐
DNS Rebinding Detector
Host header validation bypass, IP format confusion, cloud metadata SSRF via rebinding, and time-of-check-to-time-of-use DNS attacks.
🏴
Subdomain Takeover
Dangling CNAME detection across 30+ cloud providers, automated PoC deployment, and DNS record validation for takeover confirmation.
🔒
Secrets Scanner
115+ credential patterns (AWS, GCP, Azure, GitHub, Slack, Stripe), Shannon entropy analysis, git history scanning, and pre-commit hooks.
🏗️
Infrastructure-as-Code Scanner
Terraform, Kubernetes, CloudFormation, and Helm chart security analysis. Misconfig detection, CIS benchmarks, and remediation code generation.
🐳
Container Security
Dockerfile linting, Docker Compose analysis, container image CVE scanning via OSV.dev, and runtime privilege escalation detection.
📦
Dependency Monitor
8 ecosystem support (npm, pip, Maven, Gradle, Go, Ruby, Rust, PHP). OSV.dev CVE correlation, license analysis, and transitive dependency tracking.
📄
Multi-Format Export
Export findings to XLSX (color-coded), DOCX (title page + evidence), SARIF 2.1.0 (CI/CD integration), and CSV. All formats include full evidence chains.
🔄
CI/CD Pipeline Generator
Auto-generate security scanning configs for GitHub Actions, GitLab CI, Jenkins, Azure Pipelines, CircleCI, and Bitbucket Pipelines.
🧠
AI Semantic SAST
Claude-powered deep code analysis. Understands business logic, data flows, and authentication patterns beyond regex-based scanners.
🎯
Coverage-Guided Fuzzing
HTTP fuzzer with 9 mutation strategies, coverage tracking, crash analysis, and automatic vulnerability classification from anomalous responses.
🔬
Symbolic Execution Engine
Exhaustive path exploration with constraint solving. Discovers unreachable code paths, integer overflows, and logic bombs in Python source.
🔗
Cross-Scanner Correlation
Merges SAST, DAST, and SCA findings into unified attack chains. Eliminates false positives and surfaces multi-vector vulnerabilities.
🧬
Zero-Day SCA Behavioral Analysis
Typosquat detection, install-time behavior monitoring, and runtime behavioral analysis for supply chain zero-day discovery.
💬
Natural Language Scan Config
Describe your target in plain English. AI translates intent into precise scan configuration — surfaces, tools, intensity, and scope.
⚡
Auto-Triage Engine
AI-powered finding prioritization using exploitability, business impact, asset criticality, and historical context. Zero manual triage needed.
📊
Predictive Risk Scoring
Formula-based risk forecasting combining CVE frequency, exploit availability, EPSS trends, and maintainer activity for proactive defense.
🔧
IaC Remediation Auto-Gen
AI-generated Terraform, Kubernetes, and CloudFormation fix patches with unified diff view. One-click apply for infrastructure misconfigurations.
☸️
Kubernetes Admission Controller
ValidatingAdmissionWebhook blocks insecure deployments at the cluster gate. Enforces security policies before pods are scheduled.
🏢
Jira & ServiceNow Integration
Bi-directional sync with Jira Cloud/Server and ServiceNow CMDB. Auto-create tickets, sync status, and link findings to incidents.
📈
Asset Inventory & Trend Analytics
Auto-discover assets from scan results. Track vulnerability trends over time with severity distribution, MTTR, and risk trajectory charts.
💾
Backup & Data Retention
Encrypted backup/restore with SHA-256 integrity verification. Configurable retention policies with auto-purge and compliance audit trails.
🛡️
ASAR Integrity & Anti-Debug
SHA-256 application integrity verification, Electron fuse hardening, anti-debug detection (30+ debugger/RE tools), and process injection monitoring.
🔐
Memory Protection & Key Scrubbing
AI key scrubbing with secure context managers, crash dump heap exclusion, and 24-module license enforcement audit with bypass vector analysis.
🔍
Binary Detection & RE Pipeline
Automatic ELF/PE/Mach-O/APK/JAR/.pyc/Go detection. Upload binary, trigger full RE pipeline, get findings — all through the UI.
☕
Bytecode→SAST Pipeline
Decompile Java .class/.jar, .NET DLLs, Python .pyc, and Go binaries — then run SAST with 25+ security patterns per language.
📐
CFG & Symbol Analysis
Control flow graph generation, symbol extraction with cross-reference mapping, and cyclomatic complexity analysis for ELF, PE, and Mach-O binaries.
🔓
Binary Crypto & Protocol Analysis
Detect AES/DES/SHA/MD5/RSA constants, identify network protocols, extract endpoints, and flag weak crypto with CWE classification.
🕵️
Anti-Analysis & Packing Detection
Detect UPX/Themida/VMProtect packing, XOR obfuscation, anti-debug tricks, VM detection, and entropy anomalies in suspicious binaries.
🧮
Binary Symbolic Execution
Pure-Python x86-64 symbolic executor with state forking, constraint propagation, and vulnerability detection for buffer overflows, div-by-zero, and null derefs.
🦠
Malware Scanner
18 built-in YARA rules for ransomware, RAT, cryptominer, rootkit, botnet, and info stealer detection with MITRE ATT&CK mapping.
🗺️
Attack Surface Mapper
Map exported functions, network listeners, file handlers, IPC mechanisms, and plugin points from binary analysis into exploitable attack graphs.
📡
Live Activity Feed
Real-time cross-scan event stream with 500-event ring buffer. Filter by findings, errors, phases, or setup events. Pause/resume with auto-scroll and running scan context bar.
⌨️
CLI Phantom Command Interface
Native shell integration via PS1 and bash shim injected at session start. The phantom command available in every terminal on the machine throughout the engagement.
💡
App-wide Contextual Help
200+ inline tooltip registry entries covering every wizard step, scanner field, setting, and finding attribute. Context-aware help with CVSS ranges, SLA guidance, and attack surface explanations built-in.
🔔
Scanner Dependency Intelligence
Automated detection of missing optional scanner dependencies (Docker, Android debug bridge, YerraHook runtime, intercept proxy, browser automation runtime) with actionable install notifications at scan time — never a silent capability gap.