Software Category

Penetration Testing

Software Reviews covers 21 products in the Penetration Testing market. Fast track your research by exploring our Data Quadrant, sorting the software, purchasing our Penetration Testing Category Report, or diving deeper into an individual product. Arm yourself with real data so you can make better decisions with more confidence.

Write Review Buy Category Report / $2999
Category Features
  • Automation
  • |
  • Countermeasures Circumvention
  • |
  • Crawling
  • |
  • Diversity of Tools
  • |
  • Exploits
  • |
  • Host Target Scanning
  • |
  • Maintaining Access
  • |
  • Multi Faceted Testing
  • |
  • Payload Transport
  • |
  • Reconnaissance
  • |
  • Reporting

Data Quadrant

The software experience is shaped by both the software and the relationship with the vendor. By comparing vendors across both we provide a comprehensive understanding of the product and help identify vendors that can deliver on both.

Sample Report

Category Report

A thorough evaluation and ranking of all software in an individual category to compare software across every dimension.

  • User Satisfaction Rankings
  • Business Value Scores
  • Vendor Capability Comparisons
  • Individual Feature Evaluations
  • Emotional Connection to Products
Buy Now / $2999

Sample Report

Customer Experience Report

A detailed and unique report across 5 emotional dimensions that capture a powerful indicator of overall user feeling toward the vendor and product.

  • Service Experience
  • Conflict Resolution
  • Negotiation and Contract
  • Strategy and Innovation
  • Product Impact
Buy Now / $2999

Wireshark Foundation, Inc.

Wireshark

Wireshark is a widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions.

--

Composite Score

Composite
Score

+78

Emotional Footprint

Emotional
Footprint

84%

Likeliness to Recommend

Likeliness
to Recommend

5Reviews

Veracode

Veracode Penetration Testing

Veracode delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves the security of applications from inception through production so that businesses can confidently innovate with the web and mobile applications they build, buy and assemble as well as the components they integrate into their environments.

--

Composite Score

Composite
Score

+73

Emotional Footprint

Emotional
Footprint

94%

Likeliness to Recommend

Likeliness
to Recommend

2Reviews

SecureAuth

Core Impact Penetration Testing

Core Impact empowers you to replicate attacks that pivot across systems, devices, networks, and applications. This solution reveals how chains of exploitable vulnerabilities open paths to your organization’s mission-critical systems and data.

--

Composite Score

Composite
Score

+81

Emotional Footprint

Emotional
Footprint

94%

Likeliness to Recommend

Likeliness
to Recommend

2Reviews

sqlmap

sqlmap

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

--

Composite Score

Composite
Score

+42

Emotional Footprint

Emotional
Footprint

83%

Likeliness to Recommend

Likeliness
to Recommend

2Reviews

SQLNinja

SQLNinja

Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote access on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered.

--

Composite Score

Composite
Score

+62

Emotional Footprint

Emotional
Footprint

78%

Likeliness to Recommend

Likeliness
to Recommend

1Reviews

Kismet

Kismet

Kismet is a wireless network and device detector, sniffer, wardriving tool, and WIDS (wireless intrusion detection) framework.

--

Composite Score

Composite
Score

+0

Emotional Footprint

Emotional
Footprint

56%

Likeliness to Recommend

Likeliness
to Recommend

1Reviews

Aircrack-ng

Aircrack-ng

Aircrack-ng is a complete suite of tools to assess WiFi network security.

--

Composite Score

Composite
Score

--

Emotional Footprint

Emotional
Footprint

--

Likeliness to Recommend

Likeliness
to Recommend

0Reviews

Rapid7

Rapid7 metasploit

Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.

--

Composite Score

Composite
Score

--

Emotional Footprint

Emotional
Footprint

--

Likeliness to Recommend

Likeliness
to Recommend

0Reviews