Skip to content

Documentation

See how to get started in just one minute and get your first results right away.

If you don't already have a Deep Explore account, simply create your account for free and get started right now.

Welcome to the Deep Explore documentation! Below you’ll find an overview of all available pages with short descriptions to help you navigate.

Quickstart

Learn how to set up Deep Explore, run your first scan, and start uncovering vulnerabilities quickly.

Workspaces

Collaborate with your team in shared cloud workspaces to review results, analyze traffic, and resolve vulnerabilities together.

Fuzzer

Discover how the fuzzer generates inputs to test your systems, revealing weak points with automated and custom payloads.

Reports

Understand your findings with detailed, interactive reports that include proof, evidence, and actionable mitigation steps.

Traffic

Get complete visibility into data interactions with the traffic editor. Monitor, replay, and analyze requests and responses.

SIEM

Sync all your devices and monitor events in real time with Deep Explore’s integrated SIEM. Stay updated and proactive.

Modules

Learn how to extend Deep Explore with custom TypeScript modules, tailored to your specific needs and protocols.

Developer API

Automate scans, manage workspaces, and retrieve reports by integrating Deep Explore into your workflows using the Developer API.


Use this documentation to unlock the full potential of Deep Explore. If you need further assistance, reach out to our support team.

Made with ❤️ by CYTRES

CYTRES is a trademark or registered trademark of CYTRES GmbH. Any other trademarks are the property of their respective owners. Unless otherwise noted, use of third party logos does not imply endorsement of, sponsorship of, or affiliation with Cobalt.

CYTRES is a collective of dedicated cybersecurity specialists committed to crafting cutting-edge solutions for detecting and neutralizing digital threats.