🔑 PhantomYerra Help Center
The world's first AI-Agentic Security Assessment Platform. Complete documentation for all scanning surfaces, tools, reports, and configuration options.
Quick Start Guide
Get up and running in under 5 minutes. Follow these three steps in order.
Activate License
Open Settings → License. Enter your license key. PhantomYerra validates against the licensing server and unlocks all modules for your tier.
Create Auth Token
Go to Settings → Auth Tokens. Click Generate New Token. Copy and store it securely — this token is required before any active scan can run.
Run Your First Scan
Click New Scan on the home screen. The Mission Control Wizard guides you through target entry, surface selection, and scan mode. Hit Launch.
PhantomYerra requires an active internet connection for license validation. Ensure your firewall allows outbound HTTPS to licensing.dastcloud.com.
🔑 License Activation
PhantomYerra uses server-validated licensing. Each license key is tied to a machine installation code generated from your hardware.
- Open the application. The license screen appears on first launch.
- Enter your license key in the field provided (format:
PY-XXXX-XXXX-XXXX-XXXX). - Click Activate License. The app connects to
licensing.dastcloud.comto validate. - On success, you'll see your license tier, expiry date, and module entitlements.
- Your AI API key (if bundled with your license) is automatically imported — no manual entry required.
License keys are single-seat. To transfer to a new machine, contact license@phantomyerra.com with your old installation code and new machine details.
🔒 Auth Tokens
Auth tokens are security gates that prevent accidental or unauthorized scanning. Every active scan requires a valid token.
- Navigate to Settings → Auth Tokens.
- Click Generate New Token.
- Optionally name the token (e.g., "Red Team Engagement Q2").
- Copy the token and store it in a password manager. It will not be shown again.
- When launching a scan, paste the token in the auth field within the Mission Control Wizard.
You can generate multiple tokens for different engagements and revoke them individually from the Settings → Auth Tokens screen.
🔎 Run Your First Scan
- Click New Scan (or press Ctrl N).
- The Mission Control Wizard opens. Enter the target URL, IP, or CIDR range.
- Select your scope: single host, domain + subdomains, IP range, or custom list.
- Choose attack surfaces: check the modules you want (Web, Network, Recon, etc.).
- Select scan mode: Automated AI (Claude-driven), Semi-Automated (AI-suggested, you approve), or Manual (full control).
- Enter your Auth Token and click Launch Scan.
- Watch real-time progress in the Scan Dashboard. Findings appear live as they're confirmed.
In Automated AI mode, PhantomYerra plans the attack, selects tools, chains findings, and writes professional PoC narratives — all without manual intervention.
🤖 AI Key Setup
PhantomYerra uses Claude (Anthropic) as its AI brain. Your key may be bundled with your license, or you can add your own.
- If your license includes an AI key, it's activated automatically — no action needed.
- To add a manual key: go to Settings → AI Configuration.
- Select provider (Anthropic Claude is default and preferred).
- Paste your API key. It's encrypted with AES-256-GCM and stored locally — never sent in plaintext.
- Click Save & Verify. The app validates the key with a minimal test call.
Without an AI key, all 60+ tools remain fully functional. AI key unlocks: AI Pentesting mode, AI-written reports, context-aware payload generation, and agentic orchestration.
For air-gapped environments, enable Air-Gapped Mode in Settings. All AI calls route to local Ollama — zero data leaves the machine.
How-To Guides
Step-by-step instructions for every attack surface. Click any section to expand.
Full-spectrum web pentesting using Nuclei, ZAP, Nikto, WPScan, parameter discovery, TLS analysis, and fuzzing. Covers OWASP Top 10, API security, and business logic testing.
- In the Wizard, select target URL (e.g.,
https://app.example.com) and check Web Application Testing. - Choose sub-modules: Nuclei templates, ZAP active scan, parameter discovery, TLS scan, fuzzing.
- For WordPress sites, WPScan triggers automatically when WordPress is detected via fingerprinting.
- Set crawl depth and authentication (cookie/bearer token) if the target requires login.
- Launch scan. Findings display in real-time with severity, evidence (raw HTTP), and PoC curl commands.
- Click any finding → Exploit tab to run automated exploitation and capture proof.
- Export report: Reports → Generate → PDF / DOCX / SARIF.
Port scanning, service fingerprinting, VPN gateway CVE scanning (Pulse Secure / Citrix / Fortinet / Cisco), Active Directory pentesting, and network topology mapping.
- Select Network / Infrastructure in the Wizard. Enter target IP or CIDR range.
- Choose scan intensity: Stealth, Normal, Aggressive. Stealth uses SYN scan with timing delays.
- Enable VPN Gateway Scanner if the target is likely to run enterprise VPN appliances. Automatically probes for Pulse Secure CVE-2019-11510, Citrix CVE-2019-19781, Fortinet CVE-2018-13379, Cisco AnyConnect misconfigs.
- Enable Active Directory Pentest for internal network assessments. Runs Kerbruting, AS-REP roasting, BloodHound-compatible graph output.
- Topology map auto-generates showing discovered hosts, open ports, and service relationships.
- All CVE findings link to NVD entry, EPSS score, and known PoC exploits.
Subdomain enumeration, DNS reconnaissance, ASN mapping, URL discovery, and passive OSINT. Expands attack surface before active testing begins.
- Select Recon in the Wizard. Enter the root domain (e.g.,
example.com). - Choose sources: Subfinder (passive), DNS bruteforce, Certificate Transparency (crt.sh), ASN lookup, GAU (historical URLs).
- URL discovery mode crawls discovered subdomains with Katana, extracting all endpoints.
- ASN mapping identifies all IP ranges registered to the organization — useful for full-scope engagements.
- OSINT module queries GitHub, Shodan, and LinkedIn for credential leaks and exposed assets.
- All discovered assets appear in the Assets panel. Select any for deeper scanning.
Multi-language static analysis covering Python, JavaScript/TypeScript, Java, Go, Rust, Ruby, C/C++, .NET, Swift, Kotlin, COBOL, and more. Finds vulnerabilities in source code before deployment.
- Select SAST in the Wizard. Choose source: local directory, Git repository URL, or uploaded archive.
- Language auto-detection runs first. Review detected languages and confirm.
- Select rule sets: OWASP Top 10, CWE Top 25, custom rules, or compliance-specific (PCI-DSS, HIPAA).
- AI-enhanced analysis correlates findings — e.g., untrusted input at line 40 flowing into SQL query at line 87.
- SARIF report exports to IDE integration (VS Code, IntelliJ) for in-editor finding display.
- Each finding includes: file path, line number, data flow trace, severity, CWE mapping, and fix recommendation with corrected code snippet.
Active runtime testing of deployed applications including out-of-band (OOB) detection for blind vulnerabilities like SSRF, blind SQLi, and XXE.
- Select DAST in the Wizard. Provide the running application URL.
- Authentication setup: configure session cookies, OAuth tokens, or form-based login for full app coverage.
- Enable OOB Testing for out-of-band vulnerability detection. PhantomYerra generates unique OOB callback URLs per payload, capturing blind SSRF, blind SQLi, and XXE interactions.
- Set crawl strategy: spider, proxy-capture, or import Burp Suite state file.
- Active scan probes each endpoint with attack payloads. Evidence captured: request/response pairs for every finding.
- OOB interactions logged in real-time — shows DNS lookup, HTTP callback, or TCP connection confirming the vulnerability.
Detects hardcoded secrets, API keys, passwords, tokens, and credentials using TruffleHog with entropy analysis across code repositories, environment files, and binary blobs.
- Select Secrets Scanning in the Wizard.
- Choose source: Git repository (scans full commit history, not just HEAD), local directory, or Docker image.
- Entropy-based detection finds secrets even without known patterns.
- Pattern library covers 750+ known secret formats: AWS keys, GCP service accounts, GitHub tokens, Stripe keys, Twilio SIDs, database DSNs, SSH private keys, JWT secrets, and more.
- Each finding shows: file path, line number, secret type, entropy score, and redacted preview.
- Verified secrets (e.g., active AWS key validated against AWS STS) are marked VERIFIED ACTIVE — highest priority remediation.
--since-commit optional), not just the current working tree. Developers often commit secrets and delete them — TruffleHog finds both.
Binary firmware analysis using Shannon entropy, 14 magic byte type signatures, backdoor/credential extraction, Binwalk integration, and binary diff engine to detect changes between firmware versions.
- Select IoT / Firmware Analysis. Upload the firmware binary (.bin, .img, .tar.gz, .zip).
- Automatic identification: file system type (SquashFS, JFFS2, YAFFS2, EXT4), architecture (ARM, MIPS, x86), compression.
- Shannon entropy analysis flags encrypted/packed sections and potential hidden payloads.
- Binwalk extracts file system contents. All extracted files are scanned for hardcoded credentials, default passwords, and SSH keys.
- BLE/Zigbee protocol probing available for connected device testing (requires supported USB adapter).
- For binary diff: upload two firmware versions. The engine highlights added functions, modified code sections, and newly introduced strings — especially useful for identifying backdoor injection.
Real industrial protocol scanning: DNP3, BACnet/IP, EtherNet/IP CIP, and Siemens S7Comm. Reads PLC firmware versions and vendor IDs unauthenticated. Maps to IEC 62443 and NERC CIP.
- Select OT / ICS in the Wizard. Enter target IP or range (typically the OT network segment).
- Select protocols: DNP3 (port 20000), BACnet/IP (UDP 47808), EtherNet/IP (port 44818), S7Comm (port 102).
- Device discovery phase identifies PLCs, RTUs, HMIs, and engineering workstations.
- Each discovered device: vendor, firmware version, hardware revision, and configured function blocks — extracted unauthenticated where protocols allow.
- CVE correlation runs automatically against discovered firmware versions (e.g., Siemens S7-300 firmware CVEs).
- Compliance mapping to IEC 62443 zones/conduits and NERC CIP critical assets included in report.
Safety Notice: OT/ICS scanning is passive-only by default. Active exploitation is disabled and requires explicit override with written authorization. Never run active probes against production OT systems without a maintenance window.
HL7 MLLP, DICOM, and FHIR R4 protocol scanning with 20+ vendor default credential pairs. Compliance mapping to HIPAA Security Rule, FDA cybersecurity guidance, and AAMI TIR57.
- Select Medical Device Security in the Wizard.
- Choose protocols: HL7 MLLP (port 2575), DICOM (port 104), FHIR R4 REST API.
- Default credential testing against 20+ vendor pairs (GE, Philips, Siemens, Cerner, Epic, etc.).
- HL7 scanning tests for unauthenticated message injection and PHI exposure via ADT/ORU message types.
- DICOM scanning queries PACS systems for patient study metadata — confirms PHI exposure scope.
- FHIR scanning tests for misconfigured OAuth, unauthenticated patient resource access, and bulk data export vulnerabilities.
- HIPAA Security Rule control mapping auto-generates in the report.
PASSIVE_ONLY interlock is always active. Medical device scanning will never attempt to write data, send commands, or modify patient records. Read-only probing only.
Discovers Ollama, Gradio, HuggingFace Spaces, and OpenAI-compatible APIs. Fires prompt injection payloads per endpoint. Full OWASP LLM Top 10 coverage.
- Select AI / LLM Security in the Wizard. Enter target domain or IP range.
- Discovery phase: HTTP fingerprinting finds Ollama (
/api/generate), Gradio (/run/predict), HuggingFace (/models/), and OpenAI-compatible (/v1/chat/completions) endpoints. - For each discovered endpoint: 5 prompt injection payloads fire automatically, testing for direct injection, indirect injection via retrieved documents, and jailbreak attempts.
- Unauthenticated model access is flagged (LLM01 — Prompt Injection, LLM06 — Sensitive Info Disclosure).
- Model metadata extraction: model name, version, and system prompt leakage attempts.
- Results map to OWASP LLM Top 10 (v1.1). Each finding includes payload used, response received, and exploitation impact.
Vehicle security assessment covering ECU communication analysis, telematics interfaces, and over-the-air update validation. Supports physical CAN bus analysis via compatible hardware interfaces.
- Select Automotive Security in the Wizard.
- For telematics/OTA: provide the backend API endpoint or mobile app binary for analysis.
- OTA update security validation: integrity check bypass testing, rollback attack simulation, authentication mechanism review.
- For CAN bus analysis: connect a SocketCAN-compatible interface (e.g., PEAK PCAN-USB). PhantomYerra captures and decodes CAN frames.
- Diagnostic protocol testing: UDS (ISO 14229), DoIP (ISO 13400) session enumeration and security access level testing.
- TARA (Threat Analysis and Risk Assessment) report section generated per ISO/SAE 21434.
iOS and Android application security testing: static analysis, dynamic analysis, API testing, and certificate pinning bypass. OWASP Mobile Top 10 coverage.
- Select Mobile Testing. Upload the APK (Android) or IPA (iOS).
- Static analysis: decompile with JADX/apktool, extract hardcoded secrets, insecure storage patterns, and exported components.
- Manifest/Info.plist analysis: permission overgrant, debuggable flag, backup enabled, exported activities.
- Dynamic analysis requires a connected device or emulator. PhantomYerra instruments the app with Frida for runtime analysis.
- Certificate pinning bypass: automatic Frida scripts for common pinning implementations (OkHttp, NSURLSession, custom).
- API traffic capture and replay: all API calls logged during dynamic session for targeted backend testing.
- Report maps to OWASP MASVS and MSTG verification levels (L1, L2, R).
Binary analysis with Ghidra and radare2 integration, AI-assisted decompilation narration, function identification, and vulnerability pattern recognition in compiled code.
- Select Reverse Engineering. Upload the binary (ELF, PE, Mach-O, raw blob).
- Auto-analysis: architecture detection, import/export table parsing, string extraction, entropy map.
- Ghidra headless analysis generates decompiled pseudocode for all functions.
- AI narration: Claude reads decompiled functions and describes their purpose, identifies dangerous patterns (e.g., unbounded
strcpy, format string vulnerabilities, integer overflows). - Cross-reference analysis: finds all call sites for dangerous functions, traces back to user-controlled input sources.
- radare2 integration for shellcode analysis, ROP gadget discovery, and memory layout analysis.
strcmp, memcmp, or password/auth/login strings in the symbol table.
Generate CycloneDX-compliant SBOM using Syft and Grype. Identify all dependencies, their versions, licenses, and known vulnerabilities across container images, directories, and archives.
- Select SBOM Generation. Choose target: Docker image, local directory, archive, or OCI registry.
- Syft enumerates all packages: OS packages (APK, DEB, RPM), language packages (npm, pip, Maven, Go modules, Cargo), and binary signatures.
- Grype correlates each component against NVD, GitHub Security Advisories, and CISA KEV — flags actively exploited vulnerabilities at the top.
- License compliance report: flags GPL/LGPL/AGPL dependencies that may have commercial licensing implications.
- Export in CycloneDX 1.4 JSON or XML format (standard for NIST SSDF, EO 14028 compliance).
- SBOM diff: compare two SBOMs to see exactly what changed between builds — new dependencies, version bumps, removed packages.
Cron-based scan scheduling with React UI, countdown timers, and morning briefing delivery to Slack and email. Keep continuous visibility on your attack surface.
- Navigate to Scheduled Scans in the left sidebar.
- Click New Schedule. Configure target, modules, and scan mode as in a normal scan.
- Set the cron schedule using the visual picker or manual cron expression (e.g.,
0 6 * * 1-5for weekdays at 6am). - Enable Morning Briefing: a daily digest of new findings, EPSS score changes, and CISA KEV additions delivered to Slack and/or email.
- Each scheduled scan shows countdown to next run, last run status, and finding delta (new / resolved since last run).
- AI Audit Trail logs every Claude API call made during scheduled scans — timestamps, prompts, and responses captured for compliance.
SHA-256 hashing and RFC 3161 DigiCert timestamping on all evidence. Blockchain-style tamper detection with per-finding VERIFIED / TAMPERED status. Legally defensible evidence.
- Evidence chain is automatic. Every finding's evidence is SHA-256 hashed at capture time.
- RFC 3161 timestamp is requested from DigiCert's TSA immediately after evidence capture. Proves the evidence existed at a specific moment in time, signed by a trusted third party.
- The tamper detection log forms a blockchain-style chain: each entry hashes the previous entry's hash. Any modification breaks the chain.
- To verify evidence integrity: open any finding → Evidence tab → click Verify Integrity. Status shows VERIFIED (green) or TAMPERED (red) with the exact entry that breaks the chain.
- Export chain of custody report for legal proceedings or regulatory submissions: Reports → Export → Chain of Custody PDF.
Professional report generation in PDF, DOCX, XLSX, SARIF, and HTML formats. Executive summary, technical findings, evidence appendix, and remediation guidance all included.
- Navigate to Reports in the sidebar. Select the completed scan.
- Choose report template: Executive Summary, Full Technical Report, Findings-Only, Compliance Mapping, or Developer Remediation Guide.
- Select output format: PDF (WeasyPrint), DOCX, XLSX, SARIF 2.1 (for IDE/SIEM integration), or HTML.
- In AI mode: click AI-Enhance Report. Claude writes professional narrative for each finding, business impact assessment, and executive summary — all with anonymized target references to protect client confidentiality.
- Customize branding: add client logo and your company logo under Settings → Report Branding.
- For SARIF export: import directly into VS Code (SARIF Viewer extension), Azure DevOps, or GitHub Advanced Security.
Claude drives the entire engagement autonomously. Plans the attack, selects tools, executes, adapts to results, chains findings into attack paths, and writes the final report.
- In the Wizard, select Automated AI Mode.
- Enter target, scope, and engagement type (external, internal, web app, API, etc.).
- Provide your Auth Token. An AI key is required — either bundled with license or manually configured.
- Click Launch Agentic Scan. Claude receives the engagement brief and begins planning.
- Watch the Agentic Activity Log in real-time — shows Claude's reasoning, tool calls made, and findings confirmed.
- Claude calls all 60+ tools as functions, reads their outputs, and decides next steps dynamically. No pre-programmed flow.
- Attack chain graph auto-builds: shows discovery → exploitation → impact → escalation path.
- On completion, Claude writes the full report narrative. Review and approve each finding before export.
Intelligence Features
CVE Intelligence
PhantomYerra syncs CVEs from NVD (National Vulnerability Database) and CISA KEV (Known Exploited Vulnerabilities) catalog daily on first launch. To manually trigger a sync: Settings → Intelligence → Sync Now.
During scans, discovered software versions are matched against the local CVE database. Matches are enriched with: CVSS v3.1 vector and score, EPSS probability, KEV status, and known public exploit references (Exploit-DB, GitHub, Metasploit).
EPSS Scoring
EPSS (Exploit Prediction Scoring System) assigns a probability (0–1.0) that a CVE will be exploited in the wild within the next 30 days. PhantomYerra downloads daily EPSS scores and applies them to all CVE findings.
Findings are sorted by EPSS by default, not CVSS — because a CVSS 7.5 with EPSS 0.92 is more urgent than a CVSS 9.8 with EPSS 0.001. Enable CISA KEV Auto-Escalation in Intelligence settings to auto-promote any KEV-listed finding to Critical regardless of CVSS score.
Threat Actor Attribution
PhantomYerra's threat intelligence database covers 30+ APT and criminal threat groups including APT29, Lazarus, FIN7, BlackCat, LockBit, and sector-specific actors. For each discovered vulnerability, the relevant threat actors known to exploit it are listed with campaign history and targeted industries.
Access via: Intelligence → Threat Actors. Filter by sector (Healthcare, Finance, Critical Infrastructure, etc.) to see which groups target your industry.
MITRE ATT&CK Navigator Export
After a scan completes, export findings as an ATT&CK Navigator layer:
- Go to Reports → Export → ATT&CK Navigator JSON.
- Open ATT&CK Navigator in a browser.
- Click Open Existing Layer → Upload from local. Select the exported JSON file.
- The navigator highlights all techniques observed during your engagement with color coding by severity.
Settings & Configuration
AI Key Configuration
Navigate to Settings → AI Configuration.
- Provider: Select Anthropic (Claude), OpenAI (GPT-4o), Google (Gemini 1.5 Pro), or local Ollama.
- API Key: Enter and save. Encrypted with AES-256-GCM at rest. Never stored in plaintext.
- Air-Gapped Mode: Routes all AI calls to local Ollama. Zero external network calls for AI operations.
- Key Status: Shows credit balance, last validation time, and active/invalid state.
If credits run low, a non-blocking toast notification appears. If credits are exhausted, scanning continues using template-based operations — AI narrative generation and agentic mode are paused until the key is refreshed.
Proxy / Interceptor Setup
PhantomYerra can use a local interception proxy (Burp Suite, ZAP) for web scanning:
- Configure your proxy to listen on
127.0.0.1:8080(or custom port). - In PhantomYerra: Settings → Proxy → Enable Proxy. Enter host and port.
- For HTTPS interception: export your proxy's CA certificate and import it under Settings → Proxy → Trust CA Certificate.
- All web scan traffic now routes through the proxy — visible in Burp's HTTP history for manual review alongside automated findings.
Notification Configuration
Set up Slack and email alerts for scan completions, critical findings, and morning briefings:
- Slack: Create an incoming webhook in your Slack workspace. Paste the URL under Settings → Notifications → Slack Webhook. Test with the Send Test button.
- Email: Configure SMTP under Settings → Notifications → Email. Supports Gmail, Outlook, or custom SMTP with TLS/STARTTLS.
- Morning Briefing: Toggle under Scheduled Scans → Morning Briefing. Delivers daily: new findings delta, EPSS score changes, and KEV additions affecting your scanned assets.
- Critical Finding Alerts: Instant notifications when a Critical or High finding is confirmed during any active scan.
Keyboard Shortcuts
Speed up your workflow with these keyboard shortcuts. Press ? anywhere in the app to show this list.
| Action | Shortcut |
|---|---|
| New Scan | Ctrl N |
| Open Settings | Ctrl , |
| Go to Reports | Ctrl R |
| Go to Findings | Ctrl F |
| Go to Dashboard | Ctrl D |
| Go to Intelligence | Ctrl I |
| Go to Scheduled Scans | Ctrl S |
| Show Keyboard Shortcuts | ? |
| Stop Running Scan | Ctrl . |
| Export Report (current scan) | Ctrl E |
| Toggle Sidebar | Ctrl B |
| Focus Search | / |
| Escape / Close Dialog | Esc |
| Open Help Center | F1 |
| Previous Finding | K |
| Next Finding | J |
| Mark Finding as False Positive | F |
| Confirm / Exploit Finding | X |
| Copy Finding as Markdown | Ctrl C |
Troubleshooting
Solutions to the most common issues. If your issue isn't listed, email support@phantomyerra.com with your logs from Help → Export Diagnostic Log.
- Check Windows Task Manager for
python.exeprocesses. If none: the sidecar failed to start. Proceed to step 2. - Open Help → Export Diagnostic Log and check for Python errors (look for
ImportError,ModuleNotFoundError, oruvicornstartup failures). - Run the app as Administrator (right-click → Run as Administrator). Some installations require elevated privileges to write to AppData.
- Reinstall: the installer places Python and all dependencies in
%APPDATA%\PhantomYerra\. If that directory is corrupted, reinstall the app to repair it. - Windows Defender or antivirus may be blocking the Python process. See the Windows Defender troubleshooting section below.
- Test connectivity: open a browser and navigate to
https://licensing.dastcloud.com/health. You should see a JSON response. - If blocked: check corporate proxy / firewall settings. Add
licensing.dastcloud.comto the allowlist. - If the license key is rejected: ensure you're using the exact key from your purchase email, including dashes (format:
PY-XXXX-XXXX-XXXX-XXXX). - If your machine's installation code changed (hardware change): contact license@phantomyerra.com to reset the license to your new installation code.
- For persistent issues: send your installation code (visible on the license screen) and purchase email to support.
- Go to Settings → Tools. Click Verify Tools to check which are missing.
- Click Download Missing Tools. Tools are downloaded from PhantomYerra's CDN.
- If download fails: check internet connectivity and whether your proxy/firewall blocks the CDN (
tools.phantomyerra.com). - For Windows Defender blocking tool binaries: see the Defender section below. Go binaries (nuclei, httpx, etc.) are commonly flagged as false positives.
- Manual installation: download tools from their official GitHub releases and place them in
%APPDATA%\PhantomYerra\tools\. - Open Windows Security (search in Start menu).
- Click Virus & threat protection.
- Under Virus & threat protection settings, click Manage settings.
- Scroll to Exclusions. Click Add or remove exclusions.
- Click Add an exclusion → Folder.
- Navigate to and select:
%APPDATA%\PhantomYerra\(paste this path into the address bar). - Click Select Folder. The entire PhantomYerra data directory is now excluded.
- Restart PhantomYerra.
- Check the Scan Activity Log (click the log icon in the scan dashboard) for the last activity message.
- Verify the target is reachable: open Terminal (Ctrl+T) and ping the target. If unreachable, the scan will silently time out.
- Check scan timeout settings: Settings → Scan Defaults → Per-Tool Timeout. Increase for slow or high-latency targets.
- For web scans with no findings: the target may require authentication. Configure an auth profile under Settings → Auth Profiles and re-run.
- Try running a single module first (e.g., only Nuclei) to isolate which component is blocking.
- Stop the scan (Ctrl .), export the diagnostic log, and restart. Scans have crash recovery — partial results are preserved.
The sidecar (Python/FastAPI scan engine) runs as a background process. If it shows "Offline" after 60 seconds, follow these steps:
License validation requires an outbound HTTPS connection to licensing.dastcloud.com.
PhantomYerra includes bundled security tools (Nuclei, httpx, subfinder, etc.). If tools show as missing:
Security tools like Nuclei, Nmap, and SQLMap trigger heuristic antivirus detection because they perform actions that look like malware (port scanning, payload injection). These are false positives.
To add Windows Defender exclusions manually:
Only add exclusions for PhantomYerra's specific directory, not your entire system. These are real security tools — keep them isolated to their data directory.
If a scan appears stuck or returns zero findings after a long wait: