Pentest-Tools.com Description

Get a hacker’s perspective on your web apps, network, and cloud.

Pentest-Tools.com helps security teams run the key steps of a penetration test, easily and without expert hacking skills.

Headquartered in Europe (Bucharest, Romania), Pentest-Tools.com makes offensive cybersecurity tools and proprietary vulnerability scanner software for penetration testers and other infosec pros. Security teams use our toolkit to identify paths attackers can use to compromise your organization so you can effectively reduce your exposure to cyberattacks.

> Reduce repetitive pentesting work
> Write pentest reports 50% faster
> Eliminate the cost of multiple scanners

What sets us apart is we automatically merge results from our entire toolkit into a comprehensive report that’s ready to use – and easy to customize.

From recon to exploitation, automatic reports capture all your pivotal discoveries, from attack surface exposures to big “gotcha” bugs, sneaky misconfigs, and confirmed vulnerabilities.

Pricing

Pricing Starts At:
$85 per month
Pricing Information:
5 pricing packages:
- Free
- Basic
- Advanced
- Teams
- Enterprise

Also available in the AWS Marketplace
Free Version:
Yes

Integrations

API:
Yes, Pentest-Tools.com has an API

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Pentest-Tools.com
Year Founded:
2013
Headquarters:
Romania
Website:
pentest-tools.com
Update This Listing
Recommended Products
Secure your business by securing your people. Icon
Secure your business by securing your people.

Over 100,000 businesses trust 1Password

Take the guesswork out of password management, shadow IT, infrastructure, and secret sharing so you can keep your people safe and your business moving.

Product Details

Platforms
SaaS
Type of Training
Documentation
In Person
Videos
Customer Support
Phone Support
24/7 Live Support
Online

Pentest-Tools.com Features and Options

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Network Security Software

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting