• 25+

    Security modules

  • 4

    Platforms

  • 24/7

    Continuous protection

  • 6

    Products integrated

Two scanners · One dashboard

AI-Powered Vulnerability Scanner

LyrieHEX scans your infrastructure across 5 depth modes — from 30-second port checks to full subdomain enumeration. Lyrie OMEGA takes it further with autonomous AI pentesting that maps attack chains and tests exploits like a real attacker.

5

HEX scan modes

3

Export formats

Live

Terminal streaming

AI

Autonomous pentesting

Two scanners · One dashboard

AI-Powered Vulnerability Scanner

LyrieHEX scans your infrastructure across 5 depth modes — from 30-second port checks to full subdomain enumeration. Lyrie OMEGA takes it further with autonomous AI pentesting that maps attack chains and tests exploits like a real attacker.

  • 5

    HEX scan modes

  • 3

    Export formats

  • Live

    Terminal streaming

  • AI

    Autonomous pentesting

Two scanners · One dashboard

AI-Powered Vulnerability Scanner

LyrieHEX scans your infrastructure across 5 depth modes — from 30-second port checks to full subdomain enumeration. Lyrie OMEGA takes it further with autonomous AI pentesting that maps attack chains and tests exploits like a real attacker.

LyrieHEX

Five scan modes. One credit per scan.

Choose the depth that fits your needs — from a 30-second fast check to a 15-minute full recon with injection testing. Each mode builds on the last.

Fast

~20-30s

DNS recon, top 100 ports, HTTP probe + headers, critical vulns only.

Quick

~1-2 min

DNS enumeration, top 200 ports, HTTP probe + headers, critical + high severity vulns.

Full

~3-5 min

DNS + WHOIS, 1000 ports with scripts, WhatWeb fingerprinting, SSL audit, full vuln scan, path discovery.

Hybrid

~5-8 min

Subdomain enumeration, 2000 ports with scripts, WAF detection, sensitive file discovery, parameter fuzzing.

Aggressive

~10-15 min

Full recon, 3000 ports with vuln scripts, all scanners, injection checks, subdomain probing — everything maxed.

  • Fast

    ~20-30s

    DNS recon, top 100 ports, HTTP probe + headers, critical vulns only.

  • Quick

    ~1-2 min

    DNS enumeration, top 200 ports, HTTP probe + headers, critical + high severity vulns.

  • Full

    ~3-5 min

    DNS + WHOIS, 1000 ports with scripts, WhatWeb fingerprinting, SSL audit, full vuln scan, path discovery.

  • Hybrid

    ~5-8 min

    Subdomain enumeration, 2000 ports with scripts, WAF detection, sensitive file discovery, parameter fuzzing.

  • Aggressive

    ~10-15 min

    Full recon, 3000 ports with vuln scripts, all scanners, injection checks, subdomain probing — everything maxed.

Live scan streaming

Watch findings appear in real-time via server-sent events. See port scans, DNS results, and vulnerabilities as they're discovered.

Email notifications

Get notified the moment your scan completes. Never miss a result — start a scan and walk away.

Export JSON, HTML & PDF

Download your results in three formats. Professional PDF reports for stakeholders. JSON and HTML for technical review.

Verified domains only

Scans require DNS-verified domain ownership. Ensures only legitimate site owners can scan their properties.

Credit-based with refund

Each scan uses one credit. If the scan API fails to start, your credit is automatically refunded.

Scan history

Every completed scan is saved to your history. Revisit past reports, compare results, and track your security posture over time.

  • AI-powered pentesting

    Autonomous security testing that thinks like a penetration tester. Discovers attack paths, tests exploits, and chains vulnerabilities together.

  • Live terminal output

    Watch the AI work in real-time with a full terminal interface. See tool execution, findings, and attack chain progress as it happens.

  • Kill chain analysis

    Maps complete attack chains from initial access to impact. Identifies dead ends and successful exploitation paths with full context.

  • Attack surface mapping

    Automatically maps your attack surface including technologies, endpoints, and entry points. Full reconnaissance before targeted testing.

  • Executive summary

    AI-generated executive summary with risk assessment, severity breakdown, and prioritized recommendations for remediation.

  • Full report export

    Export comprehensive reports in HTML, PDF, or JSON. Includes findings, attack surface data, kill chains, and actionable remediation guidance.

Lyrie OMEGA

AI-Powered Autonomous Pentesting

OMEGA thinks like a penetration tester. It autonomously maps your attack surface, discovers vulnerabilities, tests exploits, and builds full kill chain analyses — with live terminal output you can watch in real time.

AI-powered pentesting

Autonomous security testing that thinks like a penetration tester. Discovers attack paths, tests exploits, and chains vulnerabilities together.

Live terminal output

Watch the AI work in real-time with a full terminal interface. See tool execution, findings, and attack chain progress as it happens.

Kill chain analysis

Maps complete attack chains from initial access to impact. Identifies dead ends and successful exploitation paths with full context.

Attack surface mapping

Automatically maps your attack surface including technologies, endpoints, and entry points. Full reconnaissance before targeted testing.

Executive summary

AI-generated executive summary with risk assessment, severity breakdown, and prioritized recommendations for remediation.

Full report export

Export comprehensive reports in HTML, PDF, or JSON. Includes findings, attack surface data, kill chains, and actionable remediation guidance.

  • AI-powered pentesting

    Autonomous security testing that thinks like a penetration tester. Discovers attack paths, tests exploits, and chains vulnerabilities together.

  • Live terminal output

    Watch the AI work in real-time with a full terminal interface. See tool execution, findings, and attack chain progress as it happens.

  • Kill chain analysis

    Maps complete attack chains from initial access to impact. Identifies dead ends and successful exploitation paths with full context.

  • Attack surface mapping

    Automatically maps your attack surface including technologies, endpoints, and entry points. Full reconnaissance before targeted testing.

  • Executive summary

    AI-generated executive summary with risk assessment, severity breakdown, and prioritized recommendations for remediation.

  • Full report export

    Export comprehensive reports in HTML, PDF, or JSON. Includes findings, attack surface data, kill chains, and actionable remediation guidance.

OMEGA is available on Guardian plans and above, or with purchased OMEGA credit packs. Uses separate OMEGA credits — not HEX credits.

Lyrie OMEGA

AI-Powered Autonomous Pentesting

OMEGA thinks like a penetration tester. It autonomously maps your attack surface, discovers vulnerabilities, tests exploits, and builds full kill chain analyses — with live terminal output you can watch in real time.

AI-powered pentesting

Autonomous security testing that thinks like a penetration tester. Discovers attack paths, tests exploits, and chains vulnerabilities together.

Live terminal output

Watch the AI work in real-time with a full terminal interface. See tool execution, findings, and attack chain progress as it happens.

Kill chain analysis

Maps complete attack chains from initial access to impact. Identifies dead ends and successful exploitation paths with full context.

Attack surface mapping

Automatically maps your attack surface including technologies, endpoints, and entry points. Full reconnaissance before targeted testing.

Executive summary

AI-generated executive summary with risk assessment, severity breakdown, and prioritized recommendations for remediation.

Full report export

Export comprehensive reports in HTML, PDF, or JSON. Includes findings, attack surface data, kill chains, and actionable remediation guidance.

  • AI-powered pentesting

    Autonomous security testing that thinks like a penetration tester. Discovers attack paths, tests exploits, and chains vulnerabilities together.

  • Live terminal output

    Watch the AI work in real-time with a full terminal interface. See tool execution, findings, and attack chain progress as it happens.

  • Kill chain analysis

    Maps complete attack chains from initial access to impact. Identifies dead ends and successful exploitation paths with full context.

  • Attack surface mapping

    Automatically maps your attack surface including technologies, endpoints, and entry points. Full reconnaissance before targeted testing.

  • Executive summary

    AI-generated executive summary with risk assessment, severity breakdown, and prioritized recommendations for remediation.

  • Full report export

    Export comprehensive reports in HTML, PDF, or JSON. Includes findings, attack surface data, kill chains, and actionable remediation guidance.

OMEGA is available on Guardian plans and above, or with purchased OMEGA credit packs. Uses separate OMEGA credits — not HEX credits.

What each plan includes

Free users get 1 scan credit with Fast mode. Upgrade for more modes, more credits, and OMEGA access.

Feature

HEX Modes

OMEGA

Credits

Free

Fast mode

-

1 scan credit

Free

Fast + Quick

-

20 scan credit

Guardian

All 5 modes

40 HEX + 5 OMEGA/mo

Sentinel

All 5 modes

100 HEX + 25 OMEGA/mo

Fortress

All 5 modes

Unlimited HEX + 100 OMEGA/mo

Feature

HEX Modes

OMEGA

Credits

Free

Fast mode

-

1 scan credit

Free

Fast + Quick

-

20 scan credit

Guardian

All 5 modes

40 HEX + 5 OMEGA/mo

Sentinel

All 5 modes

100 HEX + 25 OMEGA/mo

Fortress

All 5 modes

Unlimited HEX + 100 OMEGA/mo

What each plan includes

Free users get 1 scan credit with Fast mode. Upgrade for more modes, more credits, and OMEGA access.

Feature

HEX Modes

OMEGA

Credits

Free

Fast mode

-

1 scan credit

Free

Fast + Quick

-

20 scan credit

Guardian

All 5 modes

40 HEX + 5 OMEGA/mo

Sentinel

All 5 modes

100 HEX + 25 OMEGA/mo

Fortress

All 5 modes

Unlimited HEX + 100 OMEGA/mo

How it works

Verify your domain, choose your scanner, and get actionable results in minutes.

Ready to find vulnerabilities?

Start with 1 free HEX scan credit. Choose from 5 scan modes, get live streaming results, and export professional PDF reports with actionable findings.

Ready to find vulnerabilities?

Start with 1 free HEX scan credit. Choose from 5 scan modes, get live streaming results, and export professional PDF reports with actionable findings.

Ready to find vulnerabilities?

Start with 1 free HEX scan credit. Choose from 5 scan modes, get live streaming results, and export professional PDF reports with actionable findings.

Ready to find vulnerabilities?

Start with 1 free HEX scan credit. Choose from 5 scan modes, get live streaming results, and export professional PDF reports with actionable findings.

Security platform for teams that need serious protection across web applications, infrastructure, and endpoint fleets.

All Systems Operational

Platform

Features

Pricing

Enterprise

Desktop App

Anti-Malware

API

Integrations

Resources

Documentation

Blog

Security Reports

Case Studies

Company

About

Careers

Contact

Legal

Privacy Policy

Terms of Service

Legal

SOC 2 Type II

GDPR

PCI DSS

OWASP Top 10

© 2026 LYRIE.AI — OTT Cybersecurity LLC. All rights reserved.

Security platform for teams that need serious protection across web applications, infrastructure, and endpoint fleets.

All Systems Operational

Platform

Features

Pricing

Enterprise

Desktop App

Anti-Malware

API

Integrations

Resources

Documentation

Blog

Security Reports

Case Studies

Company

About

Careers

Contact

Legal

Privacy Policy

Terms of Service

Legal

SOC 2 Type II

GDPR

PCI DSS

OWASP Top 10

© 2026 LYRIE.AI — OTT Cybersecurity LLC. All rights reserved.

Security platform for teams that need serious protection across web applications, infrastructure, and endpoint fleets.

All Systems Operational

Platform

Features

Pricing

Enterprise

Desktop App

Anti-Malware

API

Integrations

Resources

Documentation

Blog

Security Reports

Case Studies

Company

About

Careers

Contact

Legal

Privacy Policy

Terms of Service

Legal

SOC 2 Type II

GDPR

PCI DSS

OWASP Top 10

© 2026 LYRIE.AI — OTT Cybersecurity LLC. All rights reserved.