


25+
Security modules


4
Platforms


24/7
Continuous protection


6
Products integrated
Two scanners · One dashboard
AI-Powered Vulnerability Scanner
LyrieHEX scans your infrastructure across 5 depth modes — from 30-second port checks to full subdomain enumeration. Lyrie OMEGA takes it further with autonomous AI pentesting that maps attack chains and tests exploits like a real attacker.


5
HEX scan modes

3
Export formats

Live
Terminal streaming

AI
Autonomous pentesting
Two scanners · One dashboard
AI-Powered Vulnerability Scanner
LyrieHEX scans your infrastructure across 5 depth modes — from 30-second port checks to full subdomain enumeration. Lyrie OMEGA takes it further with autonomous AI pentesting that maps attack chains and tests exploits like a real attacker.


5
HEX scan modes


3
Export formats


Live
Terminal streaming


AI
Autonomous pentesting
Two scanners · One dashboard
AI-Powered Vulnerability Scanner
LyrieHEX scans your infrastructure across 5 depth modes — from 30-second port checks to full subdomain enumeration. Lyrie OMEGA takes it further with autonomous AI pentesting that maps attack chains and tests exploits like a real attacker.
LyrieHEX
Five scan modes. One credit per scan.
Choose the depth that fits your needs — from a 30-second fast check to a 15-minute full recon with injection testing. Each mode builds on the last.


Fast
~20-30s
DNS recon, top 100 ports, HTTP probe + headers, critical vulns only.
Quick
~1-2 min
DNS enumeration, top 200 ports, HTTP probe + headers, critical + high severity vulns.
Full
~3-5 min
DNS + WHOIS, 1000 ports with scripts, WhatWeb fingerprinting, SSL audit, full vuln scan, path discovery.
Hybrid
~5-8 min
Subdomain enumeration, 2000 ports with scripts, WAF detection, sensitive file discovery, parameter fuzzing.
Aggressive
~10-15 min
Full recon, 3000 ports with vuln scripts, all scanners, injection checks, subdomain probing — everything maxed.
Fast
~20-30s
DNS recon, top 100 ports, HTTP probe + headers, critical vulns only.
Quick
~1-2 min
DNS enumeration, top 200 ports, HTTP probe + headers, critical + high severity vulns.
Full
~3-5 min
DNS + WHOIS, 1000 ports with scripts, WhatWeb fingerprinting, SSL audit, full vuln scan, path discovery.
Hybrid
~5-8 min
Subdomain enumeration, 2000 ports with scripts, WAF detection, sensitive file discovery, parameter fuzzing.
Aggressive
~10-15 min
Full recon, 3000 ports with vuln scripts, all scanners, injection checks, subdomain probing — everything maxed.

Live scan streaming
Watch findings appear in real-time via server-sent events. See port scans, DNS results, and vulnerabilities as they're discovered.

Email notifications
Get notified the moment your scan completes. Never miss a result — start a scan and walk away.

Export JSON, HTML & PDF
Download your results in three formats. Professional PDF reports for stakeholders. JSON and HTML for technical review.

Verified domains only
Scans require DNS-verified domain ownership. Ensures only legitimate site owners can scan their properties.

Credit-based with refund
Each scan uses one credit. If the scan API fails to start, your credit is automatically refunded.

Scan history
Every completed scan is saved to your history. Revisit past reports, compare results, and track your security posture over time.


AI-powered pentesting
Autonomous security testing that thinks like a penetration tester. Discovers attack paths, tests exploits, and chains vulnerabilities together.


Live terminal output
Watch the AI work in real-time with a full terminal interface. See tool execution, findings, and attack chain progress as it happens.


Kill chain analysis
Maps complete attack chains from initial access to impact. Identifies dead ends and successful exploitation paths with full context.


Attack surface mapping
Automatically maps your attack surface including technologies, endpoints, and entry points. Full reconnaissance before targeted testing.


Executive summary
AI-generated executive summary with risk assessment, severity breakdown, and prioritized recommendations for remediation.


Full report export
Export comprehensive reports in HTML, PDF, or JSON. Includes findings, attack surface data, kill chains, and actionable remediation guidance.

Lyrie OMEGA
AI-Powered Autonomous Pentesting
OMEGA thinks like a penetration tester. It autonomously maps your attack surface, discovers vulnerabilities, tests exploits, and builds full kill chain analyses — with live terminal output you can watch in real time.

AI-powered pentesting
Autonomous security testing that thinks like a penetration tester. Discovers attack paths, tests exploits, and chains vulnerabilities together.

Live terminal output
Watch the AI work in real-time with a full terminal interface. See tool execution, findings, and attack chain progress as it happens.

Kill chain analysis
Maps complete attack chains from initial access to impact. Identifies dead ends and successful exploitation paths with full context.

Attack surface mapping
Automatically maps your attack surface including technologies, endpoints, and entry points. Full reconnaissance before targeted testing.

Executive summary
AI-generated executive summary with risk assessment, severity breakdown, and prioritized recommendations for remediation.

Full report export
Export comprehensive reports in HTML, PDF, or JSON. Includes findings, attack surface data, kill chains, and actionable remediation guidance.


AI-powered pentesting
Autonomous security testing that thinks like a penetration tester. Discovers attack paths, tests exploits, and chains vulnerabilities together.


Live terminal output
Watch the AI work in real-time with a full terminal interface. See tool execution, findings, and attack chain progress as it happens.


Kill chain analysis
Maps complete attack chains from initial access to impact. Identifies dead ends and successful exploitation paths with full context.


Attack surface mapping
Automatically maps your attack surface including technologies, endpoints, and entry points. Full reconnaissance before targeted testing.


Executive summary
AI-generated executive summary with risk assessment, severity breakdown, and prioritized recommendations for remediation.


Full report export
Export comprehensive reports in HTML, PDF, or JSON. Includes findings, attack surface data, kill chains, and actionable remediation guidance.
OMEGA is available on Guardian plans and above, or with purchased OMEGA credit packs. Uses separate OMEGA credits — not HEX credits.

Lyrie OMEGA
AI-Powered Autonomous Pentesting
OMEGA thinks like a penetration tester. It autonomously maps your attack surface, discovers vulnerabilities, tests exploits, and builds full kill chain analyses — with live terminal output you can watch in real time.

AI-powered pentesting
Autonomous security testing that thinks like a penetration tester. Discovers attack paths, tests exploits, and chains vulnerabilities together.

Live terminal output
Watch the AI work in real-time with a full terminal interface. See tool execution, findings, and attack chain progress as it happens.

Kill chain analysis
Maps complete attack chains from initial access to impact. Identifies dead ends and successful exploitation paths with full context.

Attack surface mapping
Automatically maps your attack surface including technologies, endpoints, and entry points. Full reconnaissance before targeted testing.

Executive summary
AI-generated executive summary with risk assessment, severity breakdown, and prioritized recommendations for remediation.

Full report export
Export comprehensive reports in HTML, PDF, or JSON. Includes findings, attack surface data, kill chains, and actionable remediation guidance.


AI-powered pentesting
Autonomous security testing that thinks like a penetration tester. Discovers attack paths, tests exploits, and chains vulnerabilities together.


Live terminal output
Watch the AI work in real-time with a full terminal interface. See tool execution, findings, and attack chain progress as it happens.


Kill chain analysis
Maps complete attack chains from initial access to impact. Identifies dead ends and successful exploitation paths with full context.


Attack surface mapping
Automatically maps your attack surface including technologies, endpoints, and entry points. Full reconnaissance before targeted testing.


Executive summary
AI-generated executive summary with risk assessment, severity breakdown, and prioritized recommendations for remediation.


Full report export
Export comprehensive reports in HTML, PDF, or JSON. Includes findings, attack surface data, kill chains, and actionable remediation guidance.
OMEGA is available on Guardian plans and above, or with purchased OMEGA credit packs. Uses separate OMEGA credits — not HEX credits.

What each plan includes
Free users get 1 scan credit with Fast mode. Upgrade for more modes, more credits, and OMEGA access.
Feature
HEX Modes
OMEGA
Credits
Free
Fast mode
-
1 scan credit
Free
Fast + Quick
-
20 scan credit
Guardian
All 5 modes
40 HEX + 5 OMEGA/mo
Sentinel
All 5 modes
100 HEX + 25 OMEGA/mo
Fortress
All 5 modes
Unlimited HEX + 100 OMEGA/mo
Feature
HEX Modes
OMEGA
Credits
Free
Fast mode
-
1 scan credit
Free
Fast + Quick
-
20 scan credit
Guardian
All 5 modes
40 HEX + 5 OMEGA/mo
Sentinel
All 5 modes
100 HEX + 25 OMEGA/mo
Fortress
All 5 modes
Unlimited HEX + 100 OMEGA/mo

What each plan includes
Free users get 1 scan credit with Fast mode. Upgrade for more modes, more credits, and OMEGA access.
Feature
HEX Modes
OMEGA
Credits
Free
Fast mode
-
1 scan credit
Free
Fast + Quick
-
20 scan credit
Guardian
All 5 modes
40 HEX + 5 OMEGA/mo
Sentinel
All 5 modes
100 HEX + 25 OMEGA/mo
Fortress
All 5 modes
Unlimited HEX + 100 OMEGA/mo

How it works
Verify your domain, choose your scanner, and get actionable results in minutes.


Ready to find vulnerabilities?
Start with 1 free HEX scan credit. Choose from 5 scan modes, get live streaming results, and export professional PDF reports with actionable findings.

Ready to find vulnerabilities?
Start with 1 free HEX scan credit. Choose from 5 scan modes, get live streaming results, and export professional PDF reports with actionable findings.

Ready to find vulnerabilities?
Start with 1 free HEX scan credit. Choose from 5 scan modes, get live streaming results, and export professional PDF reports with actionable findings.

Ready to find vulnerabilities?
Start with 1 free HEX scan credit. Choose from 5 scan modes, get live streaming results, and export professional PDF reports with actionable findings.
