The evidence pipeline for
physical security.

From hardware capture to compliance proof — automatically. Works with every tool your team already uses.

vaultprobe — zsh — 80×24
18 hardware platforms supported
30+ hardware vendors fingerprinted
ISO 27001 mapped per finding
SHA-256 chain of custody per file
The Problem

Physical security has
an evidence problem.

Before

You finish a physical engagement with badge clones, signal captures, and RF dumps. Now spend 4 hours turning them into a Word doc. Manually. While your client waits for findings that should have been machine-readable from the moment of capture.

After

Vaultprobe ingests your captures, fingerprints the hardware, maps every finding to ISO 27001 and NIS2, generates SHA-256 verified evidence objects, and produces a client-grade report. In seconds. Structured for Vanta, PlexTrac, and GRC platform integration.

Process

One pipeline.
Every tool. Every framework.

01
// capture

Capture

Use any physical pentest hardware on site — Flipper Zero, Proxmark3, Chameleon Ultra, WiFi Pineapple, Kismet, or Nmap. No changes to your current workflow. Vaultprobe reads whatever your tools produce.

.nfc .sub .rfid .ibtn .ir .json .xml .log .pcap .sigmf .ducky .kismet .pineapple
02
// analyse

Analyse

Vendor fingerprinting across 30+ manufacturers. CVE matching. NIST vulnerability mapping. AI classification. Chain of custody hashing. All automatic, all auditable. AI-powered classification via Claude generates professional vulnerability narratives, attack scenarios, and remediation guidance for every finding.

03
// deliver

Deliver

ISO 27001 and NIS2-mapped PDF report plus machine-readable evidence objects structured for Vanta, PlexTrac, and GRC platform integration. Defensible. Verifiable. Done.

Report contents

Built for evidence
that holds up.

VP

Vendor Fingerprinting

Automatic identification of HID Global, FAAC, Lenel, ASSA ABLOY, and 30+ other access control vendors from raw capture data alone.

CVE + NIST Matching

Version-aware CVE lookup plus NIST SP 800-116 citations for insecure-by-design cases with no CVE. No manual research. No missed vulnerabilities.

§

ISO 27001 + NIS2 Mapping

Every finding mapped to ISO 27001 Annex A controls and NIS2 Article 21 obligations. Defensible in any compliance or regulatory conversation.

#

SHA-256 Chain of Custody

Cryptographic hash per evidence file at ingest. Tamper-evident chain of custody embedded in every report. Re-verify any capture file against the stored hash using the Vaultprobe CLI.

!

WiFi + Network Evidence

Pineapple credential captures, Kismet PMKID/handshake data, and Nmap network maps — all formatted as structured findings with compliance controls mapped.

Multi-Hardware PDF Report

Flipper Zero, Proxmark3, Chameleon, Pineapple, Kismet findings in a single client-grade report. Every hardware source labelled. One deliverable, complete picture.

AI

AI Classification

Claude AI generates professional vulnerability narratives, attack scenarios, and remediation guidance automatically. Every finding reads like it was written by a senior analyst — because the reasoning behind it was.

18

18 Hardware Platforms

Flipper Zero (6), Proxmark3, Chameleon Ultra, WiFi Pineapple, Kismet, Nmap, HackRF, Wireshark, Bluetooth, O.MG Cable, Shark Jack, OpenOCD/JTAG, and Metasploit — one pipeline, every tool.

Output

What the report
actually looks like.

Sample cover page — rendered output
VAULTPROBE
Confidential
VAULTPROBE SECURITY REPORT
Physical Access Security Assessment — Multi-Hardware Evidence Package
[Confidential]
April 2026
Flipper Zero · Proxmark3 · Chameleon Ultra · HackRF
VP-2026-8842
// findings summary
4 Critical
2 High
1 Medium
1 Low
Finding CVE Severity
Chameleon Ultra — iClass Emulation CVE-2011-4123 CRITICAL
Flipper Zero — EM4100 Clone CRITICAL
Shark Jack — No NAC Detected CRITICAL
O.MG Cable — PowerShell Executed CRITICAL
Kismet — PMKID Captured HIGH
Nmap — HID VertX Exposed CVE-2013-3598 HIGH
Who it's for

Built for the people
compliance forgot.

Pentest Firms

Stop generating Word documents. Generate compliance evidence. Your findings feed directly into your clients' GRC platforms. That's a service upgrade, not just a time saving.

Red Teams

Structured evidence for every engagement. Defensible in front of any CISO. Chain of custody that holds up under technical scrutiny and legal review.

Solo Consultants

Look like a senior analyst. Every time. Vaultprobe produces reports your clients will reference in board-level security discussions.

Compliance Teams

NIS2 and ISO 27001 demand objective evidence that physical perimeters work. Vaultprobe produces machine-readable evidence packages with cryptographic chain of custody your auditors can review and validate. No more relying on a Word document.

Early Access

Join the firms already
testing Vaultprobe.

Limited early access available. We onboard new firms personally — no self-serve signups.

✓  Request received. We'll be in touch within 24 hours.
// public launch coming

Not ready yet?
Get notified at launch.

Join the list. One email when Vaultprobe opens to everyone. No pitch. No spam.

  You're on the list. We'll be in touch when access opens.

One email. Unsubscribe anytime.