Product13 min read
Inside the Pentestas Attack Toolkit: Forge, Volley, OAST and the Manual-Testing Tabs
Every Pentestas scan exposes a Burp-style attack toolkit on top of its findings: a single-request crafter (Forge), a payload-driven multi-request runner (Volley), token-randomness analysis (Sequencer), an encode/decode swiss army knife (Decoder), a unified diff engine (Comparer), per-scan match-and-replace rules, an out-of-band callback host (OAST), and the LLM planner trace. This post walks through how each one works and how to drive a real web-app or API pentest end-to-end without leaving the scan view.