Skip to main content
Lorikeet Security / Knowledge Base
Knowledge Base

Product Knowledge Base

Everything you need to get the most out of the Lorikeet Security platform from kicking off your first pentest to monitoring your entire attack surface.

Getting Access

Lorikeet Security operates two client portals. One account accesses both.

  1. Sign up at /ptaas/signup

    Use a corporate email. Free providers (Gmail, Yahoo, etc.) are not accepted.

  2. Verify your email

    Check your inbox for the verification link. Expires in 24 hours.

  3. Log in to your chosen portal

    Use the portal toggle on the login page to switch between PTaaS and ASM.

  4. Choose a plan or activate a demo

    Demo accounts can be activated instantly with a code from the pricing page.

Demo access: Contact us at lorikeetsecurity.com/contact to get a demo code and explore the platform immediately.

Portals at a Glance

PTaaS Client Dashboard

Track active engagements, view findings in real time, manage assets, collaborate with your team, and download deliverables.

ASM Portal

Continuously monitor your external attack surface. Automated subdomain discovery, security checks, and AI-enriched findings running 24/7.

PTaaS PortalASM Portal
PurposeManaged pentest engagementsContinuous attack surface monitoring
TestingHuman-led, expert pentestsAutomated, continuous scans
FindingsCurated by pentest teamAI-enriched + KB-linked
URL/ptaas/login?portal=dashboard/ptaas/login?portal=asm
IntegrationsSlack, Jira, Teams, Discord, SMS, GitHub, GitLab, Azure DevOps, Webhooks + 20 more coming soonWebhooks, Slack, SMS
PTaaS Portal

Client Dashboard Overview

Your command center for all active and historical pentest engagements.

The PTaaS portal gives your team full visibility into every pentest Lorikeet Security runs. Track project status, review findings in real time, mark remediations, communicate with the team, and download final reports without waiting for email updates.

Project Tracking

See exactly where each engagement is in the workflow from scoping to remediation.

Live Findings

Findings appear in your dashboard as they are confirmed during the engagement.

Team Collaboration

Invite developers, security leads, and managers to your workspace.

Reports

Download final PDF reports, evidence packages, and compliance letters.

PTaaS Portal

Projects

A Project represents a single scoped pentest engagement with a type, timeline, assets, and findings attached.

Project Lifecycle

  1. Contracting

    Scope agreed, SOW being finalized.

  2. Actively Pentesting

    The Lorikeet team is live in your environment.

  3. Remediation

    Findings delivered; your team is fixing vulnerabilities.

  4. Retest

    The team verifies your fixes.

  5. Completed

    Final report issued. Project archived.

Project Types

TypeDescription
webappWeb application penetration test
apiREST / GraphQL / SOAP API security assessment
mobileiOS or Android mobile app pentest
cloudAWS, Azure, or GCP configuration review
activedirectoryActive Directory / Entra ID assessment
redteamFull red team simulation
soc2SOC 2 readiness penetration test
pcidssPCI DSS scoped assessment
thickclientDesktop / thick client application
iotIoT / embedded device testing
hardwareHardware and firmware security
physicalPhysical security assessment
PTaaS Portal

Assets

Assets define the scope of your engagement what the pentest team is authorized to test.

Testing Types

TypeWhat the Tester KnowsBest For
Black-boxNothing acts as an external attackerExternal threat simulation
Grey-boxSome credentials, docs, or architecture diagramsMost engagements balanced depth + realism
White-boxFull source code, credentials, infra accessDeep code-level review
The Additional Information field is read by your pentest team. Include staging credentials, test accounts, exclusions, and tech stack details.
PTaaS Portal

Findings

Severity Levels

SeverityCVSSWhat It MeansTypical SLA
Critical9.0–10.0Immediate exploitation risk. Full compromise likely.48 hours
High7.0–8.9High impact. May require chaining but very realistic.7 days
Medium4.0–6.9Requires prerequisites but is a material risk.30 days
Low0.1–3.9Minimal direct impact. Defense-in-depth value.90 days
Info0.0Informational observations.No SLA

Finding Statuses

  • Open Confirmed, not yet remediated
  • Ready for Retest Fixed by your team; awaiting verification
  • Remediated Fix verified by Lorikeet
  • Accepted Risk Formally accepted by your organization
  • False Positive Removed after further analysis

To request retest: click Mark Ready for Retest on the finding detail page. The Lorikeet team verifies and updates the status within the agreed retest window.

PTaaS Portal

Reports & Deliverables

  • Executive Summary Business-level risk overview for leadership and board communication
  • Technical Report Full findings with reproduction steps, evidence, and remediation
  • Evidence Package Raw HTTP requests/responses, screenshots, and PoC files
  • Retest Attestation Issued after Critical and High findings are verified remediated
  • Compliance Letter Where applicable (SOC 2, PCI DSS, ISO 27001)
Raw findings can be exported via the API for GRC tools and ticketing systems. See the Developer Docs.
PTaaS Portal

Team Management

  1. Settings → Organization

    Only the account owner or admins can invite members.

  2. Enter the team member's email

    Must match your company domain.

  3. They receive an invite email

    Invites expire after 72 hours. You can resend from the pending list.

  4. Member accepts and sets a password

    Automatically added to your company workspace.

PTaaS Portal

Billing

Lorikeet Security uses Stripe for payments, managed from Settings → Billing.

  • All major credit cards accepted
  • Invoice-based billing for enterprise accounts
  • Invoices sent to your registered email automatically
  • Receipts and history downloadable from the billing portal
For custom payment terms, PO-based billing, or multi-engagement pricing contact [email protected].
PTaaS Portal

Full Engagement Workflow

  1. Sign up and create a project

    Select your project type and add assets.

  2. Scope call with the team

    A Lorikeet engineer confirms the testing approach. Project moves to Contracting.

  3. SOW signed, engagement scheduled

    You receive a start date and a dedicated point of contact.

  4. Active testing

    Findings appear live in your dashboard as they are confirmed.

  5. Findings delivered

    Project moves to Remediation. Mark fixed items as ready for retest.

  6. Retest

    The Lorikeet team verifies all critical/high findings.

  7. Final report

    Full PDF report available in the portal. Attestation letter issued.

ASM Portal

Attack Surface Management Overview

Continuous, automated external attack surface monitoring for your domains.

The ASM portal runs ongoing security scans against your registered domains, alerting you when new subdomains appear, misconfigurations emerge, or vulnerable services are exposed.

Subdomain Enumeration

Automated discovery of all subdomains belonging to your registered domains, including shadow IT.

Security Checks

Each discovered host is checked for open ports, TLS issues, security headers, exposed services, and more.

AI Enrichment

Findings are enriched with AI-generated context, attack scenarios, and remediation from a curated KB.

Visual Screenshots

Each discovered web asset is automatically screenshotted so you can see what's exposed.

ASM Portal

Domain Management

Add root domains you own. The scanner discovers and monitors all subdomains automatically.

  1. ASM → Domains → Add Domain

    Enter your root domain (e.g. example.com).

  2. Verify ownership (some plans)

    Add a DNS TXT record to confirm ownership.

  3. Domain is monitored continuously

    Scans run on schedule. Manual scans can be triggered anytime.

Only add domains you own or have written authorization to test. The scanner performs active reconnaissance.

Domain Limits by Plan

PlanDomainsScan FrequencyFindings History
Personal1Weekly30 days
Professional5Daily90 days
CompanyUnlimitedContinuousUnlimited
ASM Portal

Scan Jobs

  1. Phase 1: Subdomain Enumeration

    DNS enumeration, certificate transparency logs, and brute-force wordlists.

  2. Phase 2: Security Checks

    Open ports, TLS/SSL config, HTTP headers, admin panels, subdomain takeover risk, and more.

  3. Phase 3: AI Enrichment + Screenshots

    Findings enriched with KB context, attack scenarios, and remediation. Screenshots captured.

StatusMeaning
PendingQueued, waiting to start
RunningActively scanning progress shown in real time
CompletedScan finished; findings available
FailedFatal error retry or contact support
ASM Portal

ASM Findings

  • TLS/SSL Expired certificates, weak ciphers, missing HSTS
  • Security Headers Missing CSP, X-Frame-Options, CORP, etc.
  • Exposed Services Admin panels, databases, RDP/SSH exposed to the internet
  • Subdomain Takeover Dangling DNS records pointing to unclaimed cloud resources
  • Open Ports Unexpected services on non-standard ports
  • Outdated Software Detected versions with known CVEs
  • Misconfiguration Public S3 buckets, exposed environment files

Each finding includes an AI Chat assistant ask "How do I fix this in nginx?", "What's the CVSS score?", or "What's the real-world impact?" and get contextual answers grounded in your specific finding.

ASM Portal

Vulnerability Knowledge Base

ASM findings are enriched against nearly 2,000 KB entries sourced from:

  • OWASP ASVS Application Security Verification Standard
  • OWASP WSTG Web Security Testing Guide
  • OWASP Top 10 Most critical web application risks
  • MITRE CWE Common Weakness Enumeration
  • MITRE CAPEC Common Attack Pattern Enumeration
ASM Portal

Plans & Limits

ASM is available as a standalone subscription. See /asm#pricing for current pricing.

Enterprise plans with custom scan frequency and API-first access are available. Contact [email protected].
NEW

Lory AI Assistant

Your AI-powered cybersecurity guide, available on every page.

Lory is Lorikeet Security's AI assistant, trained on our full service catalog, pricing, methodology, and a knowledge base of nearly 2,000 vulnerability entries from OWASP, MITRE, and industry frameworks. Lory helps visitors understand cybersecurity concepts in plain English, find the right service, compare pricing, and navigate the platform. In the authenticated portal, Lory has live access to your projects, findings, and assets for personalized security guidance.

Conversational Chat

Ask questions in everyday language. Lory translates security jargon into plain English with streaming responses.

Knowledge Base Backed

Responses grounded in OWASP Top 10, ASVS, WSTG, MITRE CWE, and MITRE CAPEC data.

Voice Input & Output

Speak your questions and listen to Lory's responses with ElevenLabs-powered natural speech.

Pricing Guidance

Get instant pricing estimates and service recommendations tailored to your needs.

Charts & Reports

Visualize your findings data with interactive charts and generate printable security reports.

Book Meetings & Invoices

Schedule Teams meetings, generate Stripe invoices, or connect with a team member, all from the chat.

Lory AI

Response Types

Lory replies with structured content blocks for a richer experience than plain text.

Block TypeDescriptionExample Use
TextPlain-language explanationAnswering "What is a pentest?"
ListBullet-pointed itemsListing compliance frameworks
Pricing CardService name, price, timeline, and descriptionShowing web app pentest pricing
Link CardLinked resource with title and descriptionLinking a relevant blog post
TableComparison data in rows and columnsComparing service packages
ChartInteractive chart (doughnut, bar, pie)Severity breakdown of findings
ReportPrintable security summary with sectionsExecutive overview of security posture
InvoiceStripe invoice for immediate paymentPaying for a web app pentest
BookingSchedule a Microsoft Teams consultationBooking a free 30-minute call
HandoffConnect with a human team member nowUrgent question about active engagement
Call to ActionButton linking to a next step"View My Projects"
Try it now: Visit lorikeetsecurity.com/lory to chat with Lory, or use the chat widget in the bottom-right corner of any page.

Where to Find Lory

  • Dedicated page /lory for a full-screen chat experience with voice input and output
  • Widget The floating chat bubble on every page of the website
  • Dashboard Authenticated Lory inside the PTaaS and ASM portals with live access to your projects, findings, and assets
Lory does not store conversations between sessions. The authenticated dashboard version has access to your live project data, findings, and assets. For sensitive questions beyond that, contact your assigned tester directly.

Integrations

Connect Lorikeet Security to your existing toolchain from Dashboard → Marketplace. We support 30+ integrations across 9 categories. View the full marketplace.

Notifications & Alerting

Slack

Real-time alerts for new findings, scan completions, and retest updates.

Microsoft Teams

Adaptive Card alerts delivered to any Teams channel.

Discord

Rich embed security alerts for teams living in Discord.

SMS NEW

Critical finding alerts delivered directly to your phone via Twilio SMS.

Custom Webhooks

Push any event to any HTTPS endpoint with HMAC signature support.

Project Management & Ticketing

Jira

Auto-create Jira issues from findings with severity-to-priority mapping.

Azure DevOps

Create work items in Azure DevOps Boards from security findings.

Code Repositories

GitHub

Code vulnerability scanning, secret detection, and dependency analysis.

GitLab

Repository scanning, issue creation, and CI/CD pipeline integration.

Bitbucket

Repository scanning and pull request security analysis.

Coming Soon

We're expanding our marketplace with enterprise-grade integrations across SIEM, compliance, cloud security, CI/CD, and vulnerability management:

Splunk

HEC event forwarding with CEF/LEEF format support.

Drata

Auto-upload pentest evidence for SOC 2 and ISO 27001 compliance.

AWS Security Hub

Push findings in ASFF format for centralized cloud security.

PagerDuty

On-call escalation with automatic incident creation.

ServiceNow

ITSM incident creation with CMDB asset linking.

Tenable / Qualys / Rapid7

Bi-directional sync with vulnerability management platforms.

Request an integration if you don't see your tool listed.

For full webhook payload format and signature verification, see the Developer Documentation.

Webhooks

  • finding.created New confirmed finding added to a project
  • finding.updated Finding severity or status changes
  • finding.resolved Finding marked remediated by the pentest team
  • scan.started / scan.completed ASM scan job lifecycle
  • asset.discovered New asset found during ASM enumeration
  • ticket.created / ticket.updated Support/retest ticket changes

FAQ

Can I use both portals with one account?

Yes. One Lorikeet Security account grants access to both. Use the portal toggle on the login page.

How long do findings take to appear after a scan?

PTaaS findings appear in real time. ASM scan jobs complete in 3–10 minutes for small-to-medium attack surfaces.

Can I export findings to CSV or PDF?

PDF export is available from the findings dashboard. JSON/CSV export is available via the API.

What domains can I add to ASM?

Only domains and IP ranges you own or have written authorization to test.

How do I request a retest?

Click Mark Ready for Retest on the finding detail page. The team is notified automatically.

Can I invite my developers?

Yes. From Settings → Organization you can invite any number of team members. All members see the same workspace data.

Contact Support

Last updated: March 2026  ·  Lorikeet Security

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!