Please wait before trying again
Autonomous threat intelligence that maps, anticipates, and neutralises adversaries before they reach your perimeter.
Continuous mapping of your attack surface across every layer — from exposed APIs to shadow infrastructure nobody told you about.
Machine learning models trained on adversary behaviour patterns to forecast attack vectors before reconnaissance begins.
When a breach is detected, our platform isolates, quarantines, and remediates — no human latency in the kill chain.
Full-spectrum network analysis with protocol-level deconstruction. Every packet tells a story — we read between the headers.
Continuous red-team operations powered by threat actor profiles. We think like them so you don't have to.
Distributed sensor mesh across your infrastructure. Silent watchers that leap into action the moment anomalies surface.
Comprehensive reconnaissance of your digital terrain. We discover assets, dependencies, and exposures across cloud, on-prem, and hybrid environments.
Contextual risk scoring powered by threat intelligence feeds, adversary TTPs, and your unique business logic. Not just CVEs — real-world exploitability.
Automated hardening recommendations deployed through your existing CI/CD pipeline. Security becomes part of the build, not an afterthought.
Continuous learning from global threat landscapes. The platform adapts its defensive posture as adversary capabilities shift and new vectors emerge.
Join the organisations that refuse to be reactive. Get early access to the Vesamuni intelligence platform.
We integrate with the world's most trusted security data sources and infrastructure providers to deliver comprehensive threat intelligence.
AI-native search API powering real-time threat research and exploit discovery across the web.
tavily.comNIST National Vulnerability Database providing authoritative CVE data, CVSS scores, and security advisories.
nvd.nist.govComprehensive vulnerability intelligence with exploit databases, patch tracking, and threat correlation.
vulners.comSecure tunneling infrastructure enabling real-time webhook delivery and agent connectivity.
ngrok.comWe're onboarding select organisations to our threat intelligence platform. Apply below and our team will review your request within 48 hours.
Vesamuni is a cloud-native cyber intelligence platform that unifies threat intelligence, attack surface mapping, and autonomous incident response into a single dashboard. Every capability available in the console is also accessible via our REST API.
All data is encrypted in transit (TLS 1.3) and at rest (AES-256-GCM). Our infrastructure spans multiple availability zones with automatic failover and 99.97% uptime SLA.
Get your organisation protected in under five minutes.
All API requests require a bearer token. Tokens are scoped to specific permissions and can be created, rotated, or revoked from your dashboard under Settings → API Keys.
Base URL: https://api.vesamuni.com/v1
Connect Vesamuni to your existing security stack. Webhooks are signed with HMAC-SHA256 for tamper-proof delivery. Official SDKs are available for all major languages.
Vesamuni was founded with a singular conviction: the asymmetry between attackers and defenders is a design problem, not an inevitability.
We don't believe in security theatre. Every feature must demonstrably reduce risk. Our platform is built by practitioners — offensive researchers, incident responders, threat analysts, and engineers who've been paged at 3am.
We operate from Melbourne, Australia and Colombo, Sri Lanka — bridging timezones to provide round-the-clock vigilance. Our distributed team brings together the best of APAC's thriving security research communities.
Melbourne gives us access to Australia's mature enterprise security market. Colombo connects us to South Asia's rapidly growing tech ecosystem. Together, we maintain continuous coverage while the rest of the world sleeps.
Vesamuni (වෙසමුනි) — In Sri Lankan folklore, Vesamuni is the fearsome king of demons. He rules the Yakkas with an iron fist, commanding spirits that once spread chaos across the land. Yet he chose to protect rather than destroy — forbidding his demons from killing, transforming them into instruments of order.
Armed with a magical golden sword that flies from his hand to strike down enemies before they see it coming, Vesamuni embodies power turned to protection.
We do the same. The tools of attackers, wielded by defenders.
We're a small team building something meaningful. If you're passionate about security and want to make an impact, we'd love to hear from you.
founders@vesamuni.comMelbourne, Australia · Colombo, Sri Lanka · Remote
We're working on publishing our security research. Follow us to get notified when we release new findings.
research@vesamuni.comWe're working on sharing our insights on security, threat intelligence, and building defensive tools. Stay tuned.
Get notifiedWhether you're evaluating the platform, exploring a partnership, or have a security research inquiry, we'd love to hear from you.
Active AI guided pentesting platform combining unlimited automated vulnerability scanning with intelligent penetration testing. Get comprehensive NVD scans, CVE monitoring and automated reports with AI pentesting credits based on your plan.
Founding partner pricing locked in for early access members.
Baseline security monitoring for WordPress sites. Automated CVE detection, NVD-backed intelligence, and monthly AI pentesting to catch what scanners miss.
AI-guided security with unlimited automated scans. Broader coverage across your full web presence with weekly reporting and real-time CVE alerting.
Deep-dive vulnerability orchestration & reporting. Maximum AI pentest credits, real-time intelligence, custom reports, API access, and 24/7 SOC dashboard for full operational visibility.
Full-spectrum managed security operations with unlimited AI pentesting, 24/7 SOC analyst coverage, incident response, and MSSP white-label capability. Built for organisations that demand continuous protection.
| WordPress Pro | Basic | Advanced | Enterprise | |
|---|---|---|---|---|
| Price | $9.99/mo | $49/mo | $109/mo | Custom |
| Vulnerability Scans | Unlimited | Unlimited | Unlimited | Unlimited |
| AI Pentest Scans / mo | 1 | 2 | 6 | Unlimited |
| NVD Database Access | ✓ | ✓ | ✓ | ✓ |
| NVD/CVE Monitoring | — | ✓ | Real-time | Real-time |
| Reports | Basic | Weekly | Custom | Custom + Board-ready |
| Email Alerts | — | ✓ | Real-time | Real-time |
| API Access | — | — | ✓ | Full + Webhooks |
| Remediation Guidance | Basic | Prioritised | Priority + Context | Managed Remediation |
| SOC Dashboard | — | — | 24/7 | 24/7 + Dedicated Analysts |
| Attack Surface Discovery | — | ✓ | Continuous | Full ASM |
| Web App Scanning | WordPress | Any web asset | Full stack | Full stack + API + Cloud |
| Compliance Mapping | — | — | ✓ | Full Automation |
| Custom Report Templates | — | — | ✓ | ✓ + White-label |
| MDR / Incident Response | — | — | — | ✓ (40hr/qtr) |
| SIEM Integration | — | — | — | ✓ |
| Dark Web Monitoring | — | — | — | ✓ |
| vCISO Advisory | — | — | — | ✓ |
| MSSP White-label | — | — | — | Full Platform |
Locked in for early access members. You won't be affected by future price increases.
Discounted rates available with annual pre-pay.
Introductory rates for independent security researchers, academic institutions, and registered non-profits. Reach out and mention your organisation type.
Start on any tier and upgrade at any time. Your scan history, configurations, and discovered assets carry over seamlessly.
Custom-scoped engagement with dedicated SOC analysts, MDR, incident response retainer, MSSP white-label, and vCISO advisory. Contact sales to scope your environment.
Join the organisations that refuse to be reactive. Get early access to the Vesamuni intelligence platform.
Enter your details to access your intelligence dashboard.
Manage your intelligence dashboard settings, contact details, and target perimeter configurations.