Software Category

Penetration Testing

Software Reviews covers 22 products in the Penetration Testing market. Fast track your research by exploring our Data Quadrant, sorting the software, purchasing our Penetration Testing Category Report, or diving deeper into an individual product. Arm yourself with real data so you can make better decisions with more confidence.

Write Review Buy Category Report / $2999
Category Features
  • Automation
  • |
  • Countermeasures Circumvention
  • |
  • Crawling
  • |
  • Crawling
  • |
  • Diversity of Tools
  • |
  • Exploits
  • |
  • Host Target Scanning
  • |
  • Maintaining Access
  • |
  • Multi-Faceted Testing
  • |
  • Payload Transport
  • |
  • Reconnaissance
  • |
  • Reporting

Data Quadrant

The software experience is shaped by both the software and the relationship with the vendor. By comparing vendors across both we provide a comprehensive understanding of the product and help identify vendors that can deliver on both.

Sample Report

Category Report

A thorough evaluation and ranking of all software in an individual category to compare software across every dimension.

  • User Satisfaction Rankings
  • Business Value Scores
  • Vendor Capability Comparisons
  • Individual Feature Evaluations
  • Emotional Connection to Products
Buy Now / $2999

Sample Report

Emotional Footprint Report

A detailed and unique report across 5 emotional dimensions that capture a powerful indicator of overall user feeling toward the vendor and product.

  • Service Experience
  • Conflict Resolution
  • Negotiation and Contract
  • Strategy and Innovation
  • Product Impact
Buy Now / $2999

PortSwigger Web Security

Burp Suite

Burp Suite finds security exposures by using cutting-edge scanning technology, you can identify the very latest vulnerabilities.

--

Composite Score

Composite
Score

+93

Emotional Footprint

Emotional
Footprint

80%

Likeliness to Recommend

Likeliness
to Recommend

9Reviews

DSquare Security

D2 Elliot Web Exploitation Framework

D2 Elliot Web Exploitation Framework helps enterprise to replicate real-life attacks during web application penetration testing by providing a powerful framework and efficient exploits and tools, validating vulnerability scans and revealing which data would be at risk.

--

Composite Score

Composite
Score

--

Emotional Footprint

Emotional
Footprint

--

Likeliness to Recommend

Likeliness
to Recommend

0Reviews

GLEG Ltd

GLEG DefPack

This is an attempt to provide pen testers with a most comprehensive collection (almost 100 exploits) of Defense software vulnerabilities illustrated in a one DefPack Exploits Package. Antiviruses, IDS and IPS systems, Firewalls, Account Management systems, End-point protection software and more are targeted.

--

Composite Score

Composite
Score

--

Emotional Footprint

Emotional
Footprint

--

Likeliness to Recommend

Likeliness
to Recommend

0Reviews

Immunity, Inc.

Immunity's Canvas

Immunity's CANVAS makes available hundreds of exploits, an automated exploitation system, and a comprehensive, reliable exploit development framework to penetration testers and security professionals worldwide.

--

Composite Score

Composite
Score

--

Emotional Footprint

Emotional
Footprint

--

Likeliness to Recommend

Likeliness
to Recommend

0Reviews

Offensive Security

Kali Linux Penetration Testing

Offensive Security provides practitioners with the highly sought-after skills required to advance their careers and better protect their organizations. We’re committed to funding and growing Kali Linux, the most widely used operating system for penetration testing, ethical hacking and network security assessments.

--

Composite Score

Composite
Score

--

Emotional Footprint

Emotional
Footprint

--

Likeliness to Recommend

Likeliness
to Recommend

0Reviews

Wireshark Foundation, Inc.

Wireshark

Wireshark is a widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions.

--

Composite Score

Composite
Score

--

Emotional Footprint

Emotional
Footprint

--

Likeliness to Recommend

Likeliness
to Recommend

0Reviews

w3af

w3af web application attack

w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to help you secure your web applications by finding and exploiting all web application vulnerabilities.

--

Composite Score

Composite
Score

--

Emotional Footprint

Emotional
Footprint

--

Likeliness to Recommend

Likeliness
to Recommend

0Reviews

Titania

Paws Studio

Paws Studio is a comprehensive security auditing tool that quickly secures vital network devices, such as workstations, laptops and servers.

--

Composite Score

Composite
Score

--

Emotional Footprint

Emotional
Footprint

--

Likeliness to Recommend

Likeliness
to Recommend

0Reviews