{"version":1,"pages":[{"id":"yXwkw2dv0U1f1Oom0sJd","title":"Overview","pathname":"/","siteSpaceId":"sitesp_RkIcw","description":"Pentest Copilot Enterprise - AI-native autonomous red-teaming/pentesting solution","breadcrumbs":[{"label":"Enterprise"}]},{"id":"Zf0ANlVgNAj9QTPv6FWB","title":"How to Trigger an External Scan","pathname":"/enterprise/how-to-trigger-an-external-scan","siteSpaceId":"sitesp_RkIcw","description":"Follow these steps to start a new external scan in Pentest Copilot Enterprise.","breadcrumbs":[{"label":"Enterprise"}]},{"id":"JqTFyGv6qHEq1MBlbEzs","title":"Configure Scan Settings for External Assessment","pathname":"/enterprise/how-to-trigger-an-external-scan/configure-scan-settings-for-external-assessment","siteSpaceId":"sitesp_RkIcw","description":"Configure scan settings for External Assessment to control how scans run, including authentication, browser sessions, rate limits, and manual crawling.","breadcrumbs":[{"label":"Enterprise"},{"label":"How to Trigger an External Scan"}]},{"id":"vJW7K5Y9mXnXTl9AXwwo","title":"Recording Browser Session","pathname":"/enterprise/how-to-trigger-an-external-scan/recording-browser-session","siteSpaceId":"sitesp_RkIcw","description":"Record Browser Sessions and help Pentest Copilot understand more about the domain.","breadcrumbs":[{"label":"Enterprise"},{"label":"How to Trigger an External Scan"}]},{"id":"gTp3xCrc2lSY05cLtbM0","title":"Importing Browser Session (Legacy)","pathname":"/enterprise/how-to-trigger-an-external-scan/importing-browser-session-legacy","siteSpaceId":"sitesp_RkIcw","description":"Browser Session allows you to run authenticated scans","breadcrumbs":[{"label":"Enterprise"},{"label":"How to Trigger an External Scan"}]},{"id":"qlsZUTSSIvcyvgbeitK1","title":"Validating Browser Sessions","pathname":"/enterprise/how-to-trigger-an-external-scan/validating-browser-sessions","siteSpaceId":"sitesp_RkIcw","description":"Post creation of browser sessions validate them to ensure successful scans","breadcrumbs":[{"label":"Enterprise"},{"label":"How to Trigger an External Scan"}]},{"id":"TZ5SP2OUJviyjLgpvBqw","title":"Handling Captcha/Email/Mobile OTPs","pathname":"/enterprise/how-to-trigger-an-external-scan/handling-captcha-email-mobile-otps","siteSpaceId":"sitesp_RkIcw","breadcrumbs":[{"label":"Enterprise"},{"label":"How to Trigger an External Scan"}]},{"id":"Qe2U4mKd2ubu7USVan3H","title":"Manual Crawler","pathname":"/enterprise/how-to-trigger-an-external-scan/manual-crawler","siteSpaceId":"sitesp_RkIcw","description":"Record Trajectories Manually","breadcrumbs":[{"label":"Enterprise"},{"label":"How to Trigger an External Scan"}]},{"id":"YLwRKt2w9nBQscRV7QFE","title":"How to Trigger an Internal Scan","pathname":"/enterprise/how-to-trigger-an-internal-scan","siteSpaceId":"sitesp_RkIcw","description":"Follow these steps to initiate an internal scan in Pentest Copilot Enterprise.","breadcrumbs":[{"label":"Enterprise"}]},{"id":"yIa5DS9u5uSEnjRhi5DZ","title":"Analysing scan results","pathname":"/enterprise/analysing-scan-results","siteSpaceId":"sitesp_RkIcw","breadcrumbs":[{"label":"Enterprise"}]},{"id":"uU6yQMZQ9kSnOXaBfIW2","title":"Attack Surface","pathname":"/enterprise/attack-surface","siteSpaceId":"sitesp_RkIcw","breadcrumbs":[{"label":"Enterprise"}]},{"id":"fBu8tFAwtjOKJ0gIxnUz","title":"Target Assets","pathname":"/enterprise/attack-surface/target-assets","siteSpaceId":"sitesp_RkIcw","breadcrumbs":[{"label":"Enterprise"},{"label":"Attack Surface"}]},{"id":"BCrViIyemF6yKw4wr7k9","title":"Agents","pathname":"/enterprise/attack-surface/agents","siteSpaceId":"sitesp_RkIcw","description":"","breadcrumbs":[{"label":"Enterprise"},{"label":"Attack Surface"}]},{"id":"SVOgW3WWDsCNP6N3NZ7R","title":"Exploit Graph","pathname":"/enterprise/exploit-graph","siteSpaceId":"sitesp_RkIcw","description":"","breadcrumbs":[{"label":"Enterprise"}]},{"id":"vErmPPbYJVzkfWsWRm3F","title":"Entities","pathname":"/enterprise/exploit-graph/entities","siteSpaceId":"sitesp_RkIcw","breadcrumbs":[{"label":"Enterprise"},{"label":"Exploit Graph"}]},{"id":"eJg7IRoFWSLBJhEBJUsQ","title":"Relations","pathname":"/enterprise/exploit-graph/relations","siteSpaceId":"sitesp_RkIcw","breadcrumbs":[{"label":"Enterprise"},{"label":"Exploit Graph"}]},{"id":"QhIJA18LiBLQI1Mb73Ay","title":"Modules","pathname":"/enterprise/modules","siteSpaceId":"sitesp_RkIcw","description":"","breadcrumbs":[{"label":"Enterprise"}]},{"id":"TJuUXyT5cbg1xFPAH61r","title":"Statistics","pathname":"/enterprise/modules/statistics","siteSpaceId":"sitesp_RkIcw","breadcrumbs":[{"label":"Enterprise"},{"label":"Modules"}]},{"id":"Qq4eYhCnXnWRSOdpI5cq","title":"Attack Paths","pathname":"/enterprise/modules/attack-paths","siteSpaceId":"sitesp_RkIcw","description":"The Attack Paths page is the triage surface for every vulnerability discovered in a module. Each row is a single finding with its full attack chain attached, from the entry point to the exploited node","breadcrumbs":[{"label":"Enterprise"},{"label":"Modules"}]},{"id":"QJ9ahgjtOWQNnN87Ivzs","title":"Activity","pathname":"/enterprise/activity","siteSpaceId":"sitesp_RkIcw","breadcrumbs":[{"label":"Enterprise"}]},{"id":"a9GP0W0haHX5Y0rHbGoi","title":"Logging","pathname":"/enterprise/activity/logging","siteSpaceId":"sitesp_RkIcw","breadcrumbs":[{"label":"Enterprise"},{"label":"Activity"}]},{"id":"LLoc9R3DJqOcKInTTM8W","title":"Scheduling","pathname":"/enterprise/activity/scheduling","siteSpaceId":"sitesp_RkIcw","breadcrumbs":[{"label":"Enterprise"},{"label":"Activity"}]},{"id":"5R9A4WOfbwrPI78VKDKg","title":"Reports","pathname":"/enterprise/reports","siteSpaceId":"sitesp_RkIcw","breadcrumbs":[{"label":"Enterprise"}]},{"id":"LpJrQylflgdeBAxdYFTn","title":"Vulnerability Testing Coverage","pathname":"/enterprise/vulnerability-testing-coverage","siteSpaceId":"sitesp_RkIcw","description":"Below is a comprehensive list of categories Pentest Copilot provides testing coverage for","breadcrumbs":[{"label":"Enterprise"}]},{"id":"rlM6Wvf99v5mqtStJf6X","title":"Settings","pathname":"/enterprise/settings","siteSpaceId":"sitesp_RkIcw","description":"The Settings section of Pentest Copilot Enterprise provides several options to configure scans, usage details, integrations, and overall app configuration.","breadcrumbs":[{"label":"Enterprise"}]},{"id":"630pgqCxCXa6IGmOxWjz","title":"API Keys & MCP Server","pathname":"/enterprise/settings/api-keys-and-mcp-server","siteSpaceId":"sitesp_RkIcw","description":"Pentest Copilot API keys let external tools call the REST API and the platform MCP server","breadcrumbs":[{"label":"Enterprise"},{"label":"Settings"}]},{"id":"0ajjGH6BFpdgg11q6axz","title":"Domains","pathname":"/enterprise/settings/domains","siteSpaceId":"sitesp_RkIcw","breadcrumbs":[{"label":"Enterprise"},{"label":"Settings"}]},{"id":"M0MfkR8EXMrAeSyOno1b","title":"Trajectories","pathname":"/enterprise/settings/trajectories","siteSpaceId":"sitesp_RkIcw","description":"Add Trajectory Whitelist and Blacklist","breadcrumbs":[{"label":"Enterprise"},{"label":"Settings"}]},{"id":"w8BbkhrPNC0OctWHNhRw","title":"Helpful Copilot","pathname":"/enterprise/helpful-copilot","siteSpaceId":"sitesp_RkIcw","breadcrumbs":[{"label":"Enterprise"}]},{"id":"qJVQdMWQN3SOOKDv02QD","title":"Download Agent","pathname":"/enterprise/download-agent","siteSpaceId":"sitesp_RkIcw","breadcrumbs":[{"label":"Enterprise"}]},{"id":"ZEr930J7P7BNAcmQqpgY","title":"User Guide","pathname":"/open-source/user-guide","siteSpaceId":"sitesp_RkIcw","description":"Pentest Copilot - Your ultimate ethical hacking assistant, copilot utilizes context to give directed results. From analysing web apps to root shells, it’s got you","breadcrumbs":[{"label":"OPEN SOURCE"}]}]}