Demo Videos

Watch Syd analyse real pentesting and forensics tool output, all offline, no cloud.

About these demos: All demonstrations use real tool output from actual security engagements (sanitised for privacy). They showcase Syd's fact-extraction architecture and evidence-based answering. Every recommendation is grounded in what your tool actually found.

Full Penetration Testing Demo (Syd v3.0)

What this demo covers:
  • End-to-end analysis workflow across multiple tools
  • Fact-extraction preventing hallucinated CVEs and exploits
  • Ask Syd AI chat for follow-up questions
  • 100% offline. Qwen 2.5 14B runs locally

Edition: Pro • Avg accuracy: 9.27/10

Nmap (96.7% Accuracy)

  • Parses Nmap XML output with 96.7% accuracy
  • Service identification and CVE cross-referencing
  • Evidence-based exploit recommendations
  • No hallucinated vulnerabilities

Tool: Nmap • Tier: Community & Pro

BloodHound (10/10 Accuracy)

  • Parses BloodHound JSON for AD attack paths
  • Privilege escalation opportunity identification
  • Lateral movement technique recommendations
  • Evidence-based answers citing specific findings

Tool: BloodHound • Tier: Community & Pro

Volatility 3: Memory Forensics

  • Volatility 3 output analysis: 8.13/10 accuracy
  • Process analysis and malware detection
  • Network connection identification from memory dumps
  • Forensics workflow recommendations

Tool: Volatility 3 • Tier: Community & Pro

YARA (9.84/10 Accuracy)

  • YARA rule match analysis: 9.84/10 accuracy
  • Malware family identification
  • Incident response workflow recommendations
  • Threat-hunting follow-up suggestions

Tool: YARA • Tier: Pro

PCAP & NetExec (NXC)

  • PCAP network traffic analysis
  • NetExec (CrackMapExec) output analysis: 9.2/10
  • SMB enumeration and credential analysis
  • Attack chain recommendations

Tools: PCAP, NetExec • Tier: Pro

Full Exploit Chain Demo

  • End-to-end exploit workflow from Nmap to shell
  • CVE identification and Metasploit module selection
  • Post-exploitation guidance
  • All analysis performed 100% offline

Tools: Nmap + Metasploit • Tier: Enterprise

More Videos on YouTube

Subscribe for more demos, tutorials and security research content

▶ Visit YouTube Channel

Why Syd's Analysis Is Different

Fact-Extraction Architecture

Syd extracts verifiable facts from your tool output first, then analyses. This prevents the AI from inventing CVEs, exploits or vulnerabilities that don't exist in your actual scan data.

Evidence-Based Answering

Every recommendation is grounded in actual scan output. If Syd suggests an exploit, it's because your scan found a vulnerable service, not because it seemed plausible.

100% Offline with Qwen 2.5 14B

All processing uses the Qwen 2.5 14B model running locally. Your sensitive scan data, client information and discovered vulnerabilities never leave your machine.

Validated: 9.27/10 Average

Accuracy tested and scored across all 6 Pro tools. 96.7% on Nmap, 10/10 on BloodHound, 9.84/10 on YARA. Real numbers from real testing, not marketing claims.

Ready to Try Syd?

Download the free Community Edition or go straight to Pro

Download Free View Pricing