Too Many Attempts

Please wait before trying again

30
Cyber Intelligence Platform

See what
others can't.

Autonomous threat intelligence that maps, anticipates, and neutralises adversaries before they reach your perimeter.

All Systems Operational · Threat Level Nominal
Threat IntelligenceAttack Surface MappingAutonomous ResponseZero-Day DetectionNetwork ForensicsAdversary SimulationVulnerability OrchestrationContinuous MonitoringThreat IntelligenceAttack Surface MappingAutonomous ResponseZero-Day DetectionNetwork ForensicsAdversary SimulationVulnerability OrchestrationContinuous Monitoring
Collaborating with global innovators
Working natively with leading platforms
Capabilities

Built for the threats that haven't happened yet.

001

Threat Cartography

Continuous mapping of your attack surface across every layer — from exposed APIs to shadow infrastructure nobody told you about.

002

Predictive Interdiction

Machine learning models trained on adversary behaviour patterns to forecast attack vectors before reconnaissance begins.

003

Autonomous Containment

When a breach is detected, our platform isolates, quarantines, and remediates — no human latency in the kill chain.

004

Deep Packet Forensics

Full-spectrum network analysis with protocol-level deconstruction. Every packet tells a story — we read between the headers.

005

Adversary Emulation

Continuous red-team operations powered by threat actor profiles. We think like them so you don't have to.

006

Sentinel Protocol

Distributed sensor mesh across your infrastructure. Silent watchers that leap into action the moment anomalies surface.

Real-Time Intelligence

The network never sleeps.

0
NVD Sync Interval
0
Scans Executed Daily
0
CVEs in Coverage Database
0
Threat Intel Feeds Integrated
Our Approach

Defence in depth,
by design.

01

Map

Comprehensive reconnaissance of your digital terrain. We discover assets, dependencies, and exposures across cloud, on-prem, and hybrid environments.

02

Analyse

Contextual risk scoring powered by threat intelligence feeds, adversary TTPs, and your unique business logic. Not just CVEs — real-world exploitability.

03

Fortify

Automated hardening recommendations deployed through your existing CI/CD pipeline. Security becomes part of the build, not an afterthought.

04

Evolve

Continuous learning from global threat landscapes. The platform adapts its defensive posture as adversary capabilities shift and new vectors emerge.

Ready to see
everything?

Join the organisations that refuse to be reactive. Get early access to the Vesamuni intelligence platform.

Powered By

Built on industry-leading intelligence.

We integrate with the world's most trusted security data sources and infrastructure providers to deliver comprehensive threat intelligence.

Early Access Program

Join the vanguard.

We're onboarding select organisations to our threat intelligence platform. Apply below and our team will review your request within 48 hours.

  • Priority onboarding with dedicated support
  • Full platform access during beta
  • Direct line to the engineering team
  • Influence the product roadmap
  • Founding partner pricing locked in
Request Access
Fields marked * are required.
Required.
Required.
Valid email required.
Required.
Required.
We typically respond within 48 hours.
Documentation

Platform Documentation

Overview

Vesamuni is a cloud-native cyber intelligence platform that unifies threat intelligence, attack surface mapping, and autonomous incident response into a single dashboard. Every capability available in the console is also accessible via our REST API.

All data is encrypted in transit (TLS 1.3) and at rest (AES-256-GCM). Our infrastructure spans multiple availability zones with automatic failover and 99.97% uptime SLA.

Getting Started

Get your organisation protected in under five minutes.

Step 1 — Sign in to your Vesamuni dashboard
https://app.vesamuni.com/login

Step 2 — Create a new project and add your domains
Navigate to Projects → New Project → Add Domains

Step 3 — Launch your first scan
Select your project → Click "Start Scan" → Choose depth level

Step 4 — Review findings in real time
Results appear live in your dashboard as the scan progresses

Authentication

All API requests require a bearer token. Tokens are scoped to specific permissions and can be created, rotated, or revoked from your dashboard under Settings → API Keys.

POST https://api.vesamuni.com/v1/auth/token
Content-Type: application/json

{
"client_id": "your_client_id",
"client_secret": "your_client_secret",
"grant_type": "client_credentials"
}

API Reference

Base URL: https://api.vesamuni.com/v1

GET /v1/assets List all discovered assets
GET /v1/intel/domain/{domain} Domain intelligence report
POST /v1/scans Launch a new scan
GET /v1/scans/{scan_id}/results Retrieve scan results
GET /v1/alerts Active threat alerts
POST /v1/webhooks Register a webhook endpoint

Integrations

Connect Vesamuni to your existing security stack. Webhooks are signed with HMAC-SHA256 for tamper-proof delivery. Official SDKs are available for all major languages.

Python
pip install vesamuni

Node.js
npm install @vesamuni/sdk

Go
go get go.vesamuni.com/sdk

Rust
cargo add vesamuni
About

We build what defenders need.

Vesamuni was founded with a singular conviction: the asymmetry between attackers and defenders is a design problem, not an inevitability.

Our Philosophy

We don't believe in security theatre. Every feature must demonstrably reduce risk. Our platform is built by practitioners — offensive researchers, incident responders, threat analysts, and engineers who've been paged at 3am.

Global Presence

We operate from Melbourne, Australia and Colombo, Sri Lanka — bridging timezones to provide round-the-clock vigilance. Our distributed team brings together the best of APAC's thriving security research communities.

Why Two Continents?

Melbourne gives us access to Australia's mature enterprise security market. Colombo connects us to South Asia's rapidly growing tech ecosystem. Together, we maintain continuous coverage while the rest of the world sleeps.

The Name

Vesamuni (වෙසමුනි) — In Sri Lankan folklore, Vesamuni is the fearsome king of demons. He rules the Yakkas with an iron fist, commanding spirits that once spread chaos across the land. Yet he chose to protect rather than destroy — forbidding his demons from killing, transforming them into instruments of order.

Armed with a magical golden sword that flies from his hand to strike down enemies before they see it coming, Vesamuni embodies power turned to protection.

We do the same. The tools of attackers, wielded by defenders.

Careers

Join us.

We're a small team building something meaningful. If you're passionate about security and want to make an impact, we'd love to hear from you.

founders@vesamuni.com

Melbourne, Australia · Colombo, Sri Lanka · Remote

Research

Coming soon.

We're working on publishing our security research. Follow us to get notified when we release new findings.

research@vesamuni.com
Blog

Coming soon.

We're working on sharing our insights on security, threat intelligence, and building defensive tools. Stay tuned.

Get notified
Contact

Let's talk.

Whether you're evaluating the platform, exploring a partnership, or have a security research inquiry, we'd love to hear from you.

hello@vesamuni.com
Melbourne, VIC, Australia
Colombo, Sri Lanka
Response within 24 hours
Required.
Valid email required.
Required.
System Status

Operational Status

All Systems Operational
Threat Intelligence APIOperational
Scan EngineOperational
DashboardOperational
Webhook DeliveryOperational
AuthenticationOperational
CLI / SDKOperational
AI Guided Pentesting Platform

AI Guided Pentesting
that never Stops.

Active AI guided pentesting platform combining unlimited automated vulnerability scanning with intelligent penetration testing. Get comprehensive NVD scans, CVE monitoring and automated reports with AI pentesting credits based on your plan.

Founding partner pricing locked in for early access members.

WordPress Security
WordPress Pro
$9.99/mo
per month

Baseline security monitoring for WordPress sites. Automated CVE detection, NVD-backed intelligence, and monthly AI pentesting to catch what scanners miss.

Scanning & Testing
  • Unlimited vulnerability scans — continuous automated scanning against your WordPress site
  • 1 AI pentest scan / month — AI-guided penetration test targeting your WordPress attack surface
  • Full NVD database access — real-time CVE matching against your installed plugins, themes & core version
  • OWASP Top 10 coverage with severity scoring (Critical → Info)
Intelligence & Monitoring
  • NVD-backed plugin & theme vulnerability detection
  • WordPress core version security tracking
  • SSL/TLS certificate monitoring
  • Outdated software & end-of-life component alerts
Reporting
  • Basic reports — scan summary with findings, severity, and remediation steps
  • PDF export of scan results
  • Dashboard access — single-site view
Support
  • Email support
  • Vesamuni knowledge base access
Full Platform
Advanced
$109/mo
per month

Deep-dive vulnerability orchestration & reporting. Maximum AI pentest credits, real-time intelligence, custom reports, API access, and 24/7 SOC dashboard for full operational visibility.

Scanning & Testing
  • Unlimited vulnerability scans — continuous automated scanning across your entire attack surface
  • 6 AI pentest scans / month — deep AI-guided penetration testing with multi-vector attack simulation
  • Real-time NVD/CVE alerts — instant notification when new vulnerabilities affect your environment
  • Full web application, API & infrastructure scanning
  • AI-driven false positive elimination with proof-of-exploit validation
  • On-demand re-scans after remediation (unlimited)
Intelligence & Monitoring
  • 24/7 SOC dashboard — real-time operational visibility into your security posture
  • Continuous attack surface discovery & asset enumeration
  • Threat intelligence feed — CVE tracking + emerging threat advisories
  • Technology stack fingerprinting & change detection
  • SSL/TLS, DNS, domain & certificate transparency monitoring
Reporting & API
  • Custom reports — configurable report templates with branding, scope & audience controls
  • API access — full REST API for scan orchestration, results retrieval & webhook integration
  • Priority remediation guidance — risk-ranked action items with context & fix recommendations
  • Compliance alignment mapping (ISO 27001, SOC 2, PCI-DSS indicators)
  • Risk trend dashboards with historical comparison
  • PDF, CSV & JSON export
Support
  • Priority email + chat support
  • Dedicated onboarding & configuration assistance
  • Vesamuni Threat Advisory bulletins
  • Early access to new platform features
Managed Security
Enterprise
Custom
tailored to your environment

Full-spectrum managed security operations with unlimited AI pentesting, 24/7 SOC analyst coverage, incident response, and MSSP white-label capability. Built for organisations that demand continuous protection.

Scanning & Testing
  • Unlimited AI pentest scans — external, internal & authenticated application-layer testing
  • Unlimited vulnerability scans — real-time continuous scanning with CI/CD webhook triggers
  • Real-time NVD/CVE alerts with zero-delay notification
  • Full web application, API & infrastructure scanning (REST, GraphQL, gRPC)
  • Cloud Security Posture Management — AWS, Azure, GCP CIS benchmark audits
  • AI red team simulation — multi-stage attack chain modelling
  • AI-driven false positive elimination with proof-of-exploit validation
  • Custom scan profiles for industry-specific threat models
SOC & Incident Response
  • 24/7 SOC — dedicated analyst team with active threat monitoring
  • Managed Detection & Response (MDR) — active threat containment & remediation
  • Incident response retainer — 40 hours/quarter included
  • Continuous attack surface management — discovery, enumeration & risk scoring
  • Dark web monitoring — credentials, data leaks & brand exposure
  • SIEM integration (Splunk, Elastic, Microsoft Sentinel)
  • Custom SOAR playbook triggers & webhook orchestration
Reporting, Compliance & API
  • Custom reports & API access — full REST API, configurable templates, branded output
  • Full compliance automation — ISO 27001, SOC 2 Type II, PCI-DSS, HIPAA, PDPA, GDPR
  • Audit liaison — direct analyst availability during compliance audits
  • Board-ready quarterly risk reports with trend analysis
  • MSSP white-label — full platform branding for channel partners
  • Multi-tenant portal — unlimited seats with role-based access control
  • SLA-backed uptime & response time guarantees
Support & Advisory
  • 24/7 priority support — 1hr critical SLA, 4hr high SLA
  • Named security advisor — virtual CISO function
  • Bi-weekly strategy sessions with remediation tracking
  • Annual tabletop exercise / breach simulation
  • Custom training workshops for your team
  • Early access to all new Vesamuni modules & features
At a glance

Side-by-side comparison
across all tiers.

WordPress Pro Basic Advanced Enterprise
Price $9.99/mo $109/mo Custom
Vulnerability Scans Unlimited Unlimited Unlimited
AI Pentest Scans / mo 1 6 Unlimited
NVD Database Access
NVD/CVE Monitoring Real-time Real-time
Reports Basic Custom Custom + Board-ready
Email Alerts Real-time Real-time
API Access Full + Webhooks
Remediation Guidance Basic Priority + Context Managed Remediation
SOC Dashboard 24/7 24/7 + Dedicated Analysts
Attack Surface Discovery Continuous Full ASM
Web App Scanning WordPress Full stack Full stack + API + Cloud
Compliance Mapping Full Automation
Custom Report Templates ✓ + White-label
MDR / Incident Response ✓ (40hr/qtr)
SIEM Integration
Dark Web Monitoring
vCISO Advisory
MSSP White-label Full Platform
Pricing Notes
Founding Partner Pricing

Locked in for early access members. You won't be affected by future price increases.

Annual Commitment

Discounted rates available with annual pre-pay.

Researchers & Non-profits

Introductory rates for independent security researchers, academic institutions, and registered non-profits. Reach out and mention your organisation type.

Upgrades

Start on any tier and upgrade at any time. Your scan history, configurations, and discovered assets carry over seamlessly.

Enterprise

Custom-scoped engagement with dedicated SOC analysts, MDR, incident response retainer, MSSP white-label, and vCISO advisory. Contact sales to scope your environment.

Ready to see
everything?

Join the organisations that refuse to be reactive. Get early access to the Vesamuni intelligence platform.

Sign in

Enter your details to access your intelligence dashboard.

Forgot?
Don't have an account? View plans

Client Profile

Manage your intelligence dashboard settings, contact details, and target perimeter configurations.

Personal Information

Target Perimeter

This is the primary domain our autonomous intelligence will actively monitor.

Account Status

Active

User ID

Assigned Tier

Enterprise
🐸