Software Category

Penetration Testing

Software Reviews covers 22 products in the Penetration Testing market. Fast track your research by exploring our Data Quadrant, sorting the software, purchasing our Penetration Testing Category Report, or diving deeper into an individual product. Arm yourself with real data so you can make better decisions with more confidence.

Write Review Buy Category Report / $2999
Category Features
  • Automation
  • |
  • Countermeasures Circumvention
  • |
  • Crawling
  • |
  • Crawling
  • |
  • Diversity of Tools
  • |
  • Exploits
  • |
  • Host Target Scanning
  • |
  • Maintaining Access
  • |
  • Multi-Faceted Testing
  • |
  • Payload Transport
  • |
  • Reconnaissance
  • |
  • Reporting

Data Quadrant

The software experience is shaped by both the software and the relationship with the vendor. By comparing vendors across both we provide a comprehensive understanding of the product and help identify vendors that can deliver on both.

Sample Report

Category Report

A thorough evaluation and ranking of all software in an individual category to compare software across every dimension.

  • User Satisfaction Rankings
  • Business Value Scores
  • Vendor Capability Comparisons
  • Individual Feature Evaluations
  • Emotional Connection to Products
Buy Now / $2999

Sample Report

Customer Experience Report

A detailed and unique report across 5 emotional dimensions that capture a powerful indicator of overall user feeling toward the vendor and product.

  • Service Experience
  • Conflict Resolution
  • Negotiation and Contract
  • Strategy and Innovation
  • Product Impact
Buy Now / $2999

PortSwigger Web Security

Burp Suite

Burp Suite finds security exposures by using cutting-edge scanning technology, you can identify the very latest vulnerabilities.

8.6

Composite Score

Composite
Score

+95

Emotional Footprint

Emotional
Footprint

86%

Likeliness to Recommend

Likeliness
to Recommend

15Reviews

Wireshark Foundation, Inc.

Wireshark

Wireshark is a widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions.

--

Composite Score

Composite
Score

+80

Emotional Footprint

Emotional
Footprint

86%

Likeliness to Recommend

Likeliness
to Recommend

5Reviews

Veracode

Veracode Penetration Testing

Veracode delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves the security of applications from inception through production so that businesses can confidently innovate with the web and mobile applications they build, buy and assemble as well as the components they integrate into their environments.

--

Composite Score

Composite
Score

+73

Emotional Footprint

Emotional
Footprint

95%

Likeliness to Recommend

Likeliness
to Recommend

2Reviews

SecureAuth

Core Impact Penetration Testing

Core Impact empowers you to replicate attacks that pivot across systems, devices, networks, and applications. This solution reveals how chains of exploitable vulnerabilities open paths to your organization’s mission-critical systems and data.

--

Composite Score

Composite
Score

+83

Emotional Footprint

Emotional
Footprint

95%

Likeliness to Recommend

Likeliness
to Recommend

2Reviews

sqlmap

sqlmap

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

--

Composite Score

Composite
Score

+44

Emotional Footprint

Emotional
Footprint

85%

Likeliness to Recommend

Likeliness
to Recommend

2Reviews

SQLNinja

SQLNinja

Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote access on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered.

--

Composite Score

Composite
Score

+62

Emotional Footprint

Emotional
Footprint

80%

Likeliness to Recommend

Likeliness
to Recommend

1Reviews

Kismet

Kismet

Kismet is a wireless network and device detector, sniffer, wardriving tool, and WIDS (wireless intrusion detection) framework.

--

Composite Score

Composite
Score

-4

Emotional Footprint

Emotional
Footprint

60%

Likeliness to Recommend

Likeliness
to Recommend

1Reviews

w3af

w3af web application attack

w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to help you secure your web applications by finding and exploiting all web application vulnerabilities.

--

Composite Score

Composite
Score

--

Emotional Footprint

Emotional
Footprint

--

Likeliness to Recommend

Likeliness
to Recommend

0Reviews