Best for: Expert pentesters who prefer direct tool control, complex engagements requiring custom tooling, or environments where AI features are disabled (air-gapped, regulated industries).

Prerequisites

  • Written authorization from client (mandatory β€” checked before any active scan)
  • Scan tools installed (Settings β†’ Tools)
  • Target in approved scope list
  • No AI key required β€” all manual mode features work without Claude
  1. 1

    Open Tool Runner

    From the Home Screen, click any attack surface, then select Manual Mode in Wizard Step 2. Or navigate directly to Tools β†’ Tool Runner from the left sidebar.

    πŸ’‘ Keyboard shortcut: Ctrl+T opens the Tool Runner from anywhere in the app.
  2. 2

    Select a Tool from the Library

    The Tool Runner shows all 60+ installed tools organized by category: Recon, Web, API, Network, Cloud, Mobile, RE, and Reporting. Click any tool to open its configuration panel.

  3. 3

    Configure and Run

    Each tool panel shows all available flags with descriptions. Fill in the target and any options, then click Run. Output streams live to the Results panel. You can run multiple tools simultaneously in separate tabs.

  4. 4

    Log Findings Manually

    When you find a vulnerability, click + Add Finding in the Findings panel (or press Ctrl+F). Enter the finding details β€” PhantomYerra calculates CVSS and EPS scores automatically from the severity inputs.

  5. 5

    Attach Evidence

    In the Finding Detail panel, click Attach Evidence to upload screenshots, HTTP request/response captures, or tool output files. All evidence is SHA-256 hashed and RFC 3161 timestamped for chain of custody.

  6. 6

    Generate Report

    When your manual testing is complete, go to Reports β†’ Generate. In manual mode, reports use template-based generation (no AI required). Select Executive, Technical, or Compliance template and download the PDF.

⏱️ Duration: fully determined by the tester. Manual mode imposes no time constraints or auto-progression.

Common Issues

Check that the tool binary path is correct in Settings β†’ Tools. Some tools require elevated privileges (nmap raw socket mode requires root/admin). Try running the tool from the integrated terminal first to confirm it works, then use the Tool Runner.

Ensure all 8 CVSS v3.1 base metric fields are filled in. The score only calculates when all fields have a value. Use the CVSS calculator reference in the Finding Editor (click the "?" icon next to CVSS Vector) if you're unsure which values to select.

Yes. Go to Findings β†’ Import β†’ select format: Burp Suite XML, Nessus .nessus, OpenVAS XML, SARIF, or generic CSV. PhantomYerra maps imported findings to its schema and calculates CVSS scores where possible.