Automated recon + vulnerability detection
Web pentest with safe exploitation
Full pentest + Nessus scan
Nessus Professional scan
Subdomain enum, email harvest, leaked creds
Internal Nessus via tunnel
Verify remediation of previous findings