Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

N-Stalker Web Application Security Scanner X is an advanced solution designed for assessing the security of web applications. It combines the renowned “N-Stealth HTTP Security Scanner” with a comprehensive database of 39,000 web attack signatures, along with innovative patent-pending technology focused on component-oriented security assessment. This tool is essential for developers, system and security administrators, as well as IT auditors and their teams. It offers a complete package tailored for developers and IT security professionals, featuring thorough security checks for both web applications and server infrastructures. Additionally, it serves as a valuable resource for Web Server Administrators and IT Professionals, enabling them to evaluate the security of their web server environments effectively. There is also a community edition available, which includes a limited selection of security checks for both applications and server infrastructure, making it accessible for those who may not need the full suite of features.

Description

StackHawk evaluates your active applications, services, and APIs for potential security flaws introduced by your team, as well as for vulnerabilities in open-source components that could be exploited. In today's engineering landscape, automated testing suites integrated within CI/CD processes have become standard practice. So, why should application security not follow suit? StackHawk is designed to identify vulnerabilities right within your development pipeline. The phrase "built for developers" embodies the core philosophy of StackHawk, emphasizing the importance of integrating security into the development process. As application security evolves to keep pace with the rapid tempo of modern engineering teams, developers require tools that enable them to assess and remediate security issues effectively. With StackHawk, security can advance in tandem with development, allowing teams to detect vulnerabilities at the stage of pull requests and implement fixes swiftly, whereas traditional security tools often lag behind, waiting for manual scans to be initiated. This tool not only meets the needs of developers but is also backed by the most widely adopted open-source security scanner available, ensuring it remains a favorite among users. Ultimately, StackHawk empowers developers to embrace security as an integral part of their workflow.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Azure Pipelines
CircleCI
Claude Code
Concourse
Datadog
Docker
GitHub
GitLab
Jenkins
Jira
Microsoft Teams
OpenAI Codex
Slack
Travis CI
Tromzo
ZAP Data Hub

Integrations

Amazon Web Services (AWS)
Azure Pipelines
CircleCI
Claude Code
Concourse
Datadog
Docker
GitHub
GitLab
Jenkins
Jira
Microsoft Teams
OpenAI Codex
Slack
Travis CI
Tromzo
ZAP Data Hub

Pricing Details

$499 per year
Free Trial
Free Version

Pricing Details

$99 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

N-Stalker

Country

Brazil

Website

www.nstalker.com/products/editions/

Vendor Details

Company Name

StackHawk

Founded

2019

Country

United States

Website

www.stackhawk.com

Product Features

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Automated Testing

Hierarchical View
Move & Copy
Parameterized Testing
Requirements-Based Testing
Security Testing
Supports Parallel Execution
Test Script Reviews
Unicode Compliance

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Alternatives

Alternatives

Acunetix Reviews

Acunetix

Invicti Security
Nikto Reviews

Nikto

CIRT.net
Invicti Reviews

Invicti

Invicti Security