Neo is a system of specialized agents coordinated by a central orchestrator that understands your request, determines which capabilities are needed, and delegates work to the right specialist. When you ask Neo to test a web application, it does not try to handle reconnaissance, scanning, browser-based exploitation, and reporting all within one monolithic reasoning loop. Instead, it breaks the work across purpose-built agents, each with their own tools, domain expertise, and execution boundaries. The orchestrator is the agent you interact with directly. It receives your message, evaluates what needs to happen, and triggers one or more subagents to carry out the work. When a subagent finishes, it hands control back to the orchestrator with a structured result: what it accomplished, what files it produced, and optionally a recommendation for which agent should handle the next step. The orchestrator then decides whether to present the results, trigger another subagent, or continue the task itself. Neo ships with over 20 built-in subagents, each designed for a specific class of security work.Documentation Index
Fetch the complete documentation index at: https://docs.neo.projectdiscovery.io/llms.txt
Use this file to discover all available pages before exploring further.
| Agent | What it does |
|---|---|
| Sandbox | Primary execution specialist. Full access to the sandbox with the complete security toolchain. Runs commands, writes scripts, executes scans, and produces files. Most hands-on testing flows through this agent. |
| Browser | Real browser interaction for DOM-based XSS, CSRF, UI logic abuse, screenshots, and Playwright PoCs. Two modes: cloud browser with stealth and CAPTCHA solving for public targets, or local sandbox browser for internal and VPN-only targets. |
| Recon | Passive intelligence gathering. DNS enumeration, subdomain discovery, domain association mapping, leaked credential lookups, and certificate transparency searches via ProjectDiscovery cloud APIs. |
| Red team operator | Authorized adversary simulation and internal penetration testing. Scope-aware, designed for assumed-breach workflows, network enumeration, credential attacks with lockout guardrails, and controlled exploitation. |
| API security | API discovery and testing using OpenAPI specifications. Ingests API specs, enumerates endpoints, and tests for authentication bypasses, injection flaws, and business logic issues. |
| Android security | Mobile application testing on Genymotion cloud devices. Adaptive methodology: static analysis, dynamic instrumentation, network interception, and runtime exploitation. |
| iOS security | iOS penetration testing on cloud-streamed devices and jailbroken physical hardware. Deep runtime inspection with Frida for both standard and advanced assessments. |
| CVE intelligence | Vulnerability research. Pulls CVE details, analyzes exploitability, and correlates findings against known vulnerability databases. |
| Research | Live web search for security advisories, exploit disclosures, and technical documentation. Complements CVE intelligence with real-time open-source intelligence. |
| XSS | Dedicated cross-site scripting specialist. Context analysis to identify where and how input is reflected in responses, then crafts context-appropriate payloads. |
| Verifier | Independent vulnerability reproduction. Receives a claimed finding and proves or disproves it through its own testing. Returns a structured verdict: confirmed, false positive, or needs retry. |
| Ghidra | Binary reverse engineering. Decompiles functions, finds buffer overflows, searches for dangerous API calls, and documents binary internals. |
| Vulnerability triage | Reviews and validates findings from any source, including HackerOne reports. Assesses severity based on real-world impact and exploitability. |
| Explore | Deep target analysis and codebase exploration. Used when the task requires understanding the target’s architecture before active testing begins. |
| Deploy | Container orchestration for spinning up target applications, test environments, or vulnerable lab setups inside Kata VM-isolated containers. |
| GitHub review | Automated PR security reviews with a full scanner pipeline. Analyzes code changes for vulnerabilities and posts findings as review comments. |
| Linear | Issue tracking integration. Creates, updates, and manages Linear issues from within Neo tasks. |
| Slack | Handles all interactions originating from Slack channels, DMs, or assistant panels. Owns result posting back to Slack. |
| Subagent manager | Creates, edits, and manages your custom subagents. Handles tool configuration, system instructions, and lifecycle management. |
| Connector | Manages third-party integrations. Connects and disconnects services like GitHub, Jira, Linear, and Slack. |
| Validation | Runtime validation of security findings against live target URLs. Tests endpoints for auth bypass, IDOR, SSRF, XSS, and path traversal after code reviews. |

