# Detectify, Pentest-Tools.com vs Invicti (formerly Netsparker) Comparison

| | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Star Rating** | 4.5 out of 5 | 4.8 out of 5 | 4.6 out of 5 | 
| **Total Reviews** | 51 | 100 | 69 | 
| **Largest Market Segment** | Small-Business (47.9% of reviews) | Small-Business (67.4% of reviews) | Enterprise (47.7% of reviews) | 
| **Entry Level Price** | Contact Us | Free | No pricing available | 

---
## Top Pros & Cons

### Detectify

Pros:
- Automation (2 reviews)
- Automation Testing (2 reviews)

Cons:
- Complexity (1 reviews)
- Complex Queries (1 reviews)

### Pentest-Tools.com

Pros:
- Ease of Use (6 reviews)
- Automation (4 reviews)

Cons:
- Difficult Customization (2 reviews)
- Limited Features (2 reviews)

### Invicti (formerly Netsparker)

Pros:
- Ease of Use (9 reviews)
- Scanning Technology (7 reviews)

Cons:
- Poor Customer Support (3 reviews)
- Slow Performance (3 reviews)

---
## Ratings Comparison
| Rating | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
  | **Meets Requirements** | 8.7 (34 reviews) | 9.0 (69 reviews) | 9.1 (59 reviews) | 
  | **Ease of Use** | 9.0 (35 reviews) | 9.4 (72 reviews) | 9.1 (59 reviews) | 
  | **Ease of Setup** | 9.2 (25 reviews) | 9.5 (64 reviews) | 9.0 (49 reviews) | 
  | **Ease of Admin** | 8.7 (26 reviews) | 9.4 (54 reviews) | 9.2 (46 reviews) | 
  | **Quality of Support** | 9.4 (31 reviews) | 9.3 (65 reviews) | 8.9 (59 reviews) | 
  | **Has the product been a good partner in doing business?** | 9.7 (24 reviews) | 9.4 (52 reviews) | 9.6 (44 reviews) | 
  | **Product Direction (% positive)** | 7.7 (31 reviews) | 9.6 (59 reviews) | 10.0 (55 reviews) | 

---
## Pricing

### Detectify

#### Entry-Level Pricing

Plan: Full EASM solution

Price: Contact Us

Description: Designed for large organizations, this scalable package offers broader coverage of your external attack surface, is made for easy and flexible roll-out, and provides additional Enterprise support. 

Key Features:
- Advanced API functionality and easy domain verification
- Extended authentication control with SSO access and 2FA
- Multi team set-up for flexible organizing of assets, access levels and results

[Browse all 2 editions](https://www.g2.com/products/detectify/pricing)

#### Free Trial

Yes

### Pentest-Tools.com

#### Entry-Level Pricing

Plan: The free edition

Price: Free

Description: Get a hands-on glimpse into how Pentest-Tools.com works

Key Features:
- Quick exposure discovery (open ports, virtual hosts, subdomains, and more)
- Limited-feature vulnerability scanning tools for network, web app, and API targets
- Cloud vulnerability scanning

[Browse all 5 editions](https://www.g2.com/products/pentest-tools-com/pricing)

#### Free Trial

No

### Invicti (formerly Netsparker)

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

---
## Features Comparison By Category

### Website Security

| Product | Score | Reviews |
|---|---|---|
| **Detectify** | 8.3/10 | 19 |
| **Pentest-Tools.com** | 7.6/10 | 32 |
| **Invicti (formerly Netsparker)** | 8.9/10 | 26 |

#### Administration

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Content Delivery** | 7.5 (10 reviews) | 8.1 (29 reviews) | 8.7 (18 reviews) | 
| **Dashboard &amp; Reporting** | 8.8 (17 reviews) | 8.8 (32 reviews) | 9.5 (22 reviews) | 
| **Alerting** | 9.2 (14 reviews) | 8.6 (29 reviews) | 9.0 (22 reviews) | 

#### Risk Analysis

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Blacklist and Whitelist** | 8.1 (7 reviews) | 7.7 (27 reviews) | Feature Not Available | 
| **Vulnerability Assessment** | 8.0 (14 reviews) | 9.2 (32 reviews) | 9.3 (23 reviews) | 
| **Security Auditing** | 8.2 (11 reviews) | 8.7 (30 reviews) | 9.2 (23 reviews) | 

#### Threat Protection

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Firewall** | Not enough data | 6.8 (24 reviews) | 7.9 (13 reviews) | 
| **DDoS Protection** | Not enough data | 6.4 (23 reviews) | Feature Not Available | 
| **Malware Detection** | Not enough data | 6.7 (25 reviews) | 8.2 (14 reviews) | 
| **Malware Removal** | Not enough data | 6.2 (23 reviews) | Feature Not Available | 

#### Generative AI

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **AI Text Summarization** | Not enough data | 6.3 (12 reviews) | Feature Not Available | 

### Penetration Testing

| Product | Score | Reviews |
|---|---|---|
| **Detectify** | 8.9/10 | 10 |
| **Pentest-Tools.com** | 8.1/10 | 49 |
| **Invicti (formerly Netsparker)** | 8.7/10 | 21 |

#### Administration

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **API / Integrations** | 8.0 (5 reviews) | 7.7 (28 reviews) | 8.2 (14 reviews) | 
| **Extensibility** | Not enough data | 6.9 (6 reviews) | 8.3 (13 reviews) | 
| **Reporting and Analytics** | 8.8 (7 reviews) | 8.4 (46 reviews) | 9.1 (18 reviews) | 

#### Analysis

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Issue Tracking** | 7.8 (6 reviews) | 8.2 (40 reviews) | 8.4 (15 reviews) | 
| **Reconnaissance** | 9.2 (8 reviews) | 8.6 (46 reviews) | 9.0 (17 reviews) | 
| **Vulnerability Scan** | 9.3 (9 reviews) | 9.1 (48 reviews) | 9.7 (18 reviews) | 

#### Testing

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Command-Line Tools** | Feature Not Available | 7.0 (29 reviews) | 7.6 (12 reviews) | 
| **Manual Testing** | Feature Not Available | Feature Not Available | 8.6 (15 reviews) | 
| **Test Automation** | 9.7 (6 reviews) | 8.5 (38 reviews) | 9.0 (18 reviews) | 
| **Performance and Reliability** | 9.5 (7 reviews) | 8.8 (43 reviews) | 9.1 (18 reviews) | 

### Static Application Security Testing (SAST)

| Product | Score | Reviews |
|---|---|---|
| **Detectify** | N/A | N/A |
| **Pentest-Tools.com** | N/A | N/A |
| **Invicti (formerly Netsparker)** | N/A | N/A |

#### Administration

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **API / Integrations** | Not enough data | Not enough data | Not enough data | 
| **Extensibility** | Not enough data | Not enough data | Not enough data | 

#### Analysis

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Reporting and Analytics** | Not enough data | Not enough data | Not enough data | 
| **Issue Tracking** | Not enough data | Not enough data | Not enough data | 
| **Static Code Analysis** | Not enough data | Not enough data | Not enough data | 
| **Code Analysis** | Not enough data | Not enough data | Not enough data | 

#### Testing

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Command-Line Tools** | Not enough data | Not enough data | Not enough data | 
| **Manual Testing** | Not enough data | Not enough data | Not enough data | 
| **Test Automation** | Not enough data | Not enough data | Not enough data | 
| **Compliance Testing** | Not enough data | Not enough data | Not enough data | 
| **Black-Box Scanning** | Not enough data | Not enough data | Not enough data | 
| **Detection Rate** | Not enough data | Not enough data | Not enough data | 
| **False Positives** | Not enough data | Not enough data | Not enough data | 

#### Agentic AI - Static Application Security Testing (SAST)

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 

### Dynamic Application Security Testing (DAST)

| Product | Score | Reviews |
|---|---|---|
| **Detectify** | 7.7/10 | 11 |
| **Pentest-Tools.com** | 7.5/10 | 9 |
| **Invicti (formerly Netsparker)** | 8.4/10 | 30 |

#### Administration

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **API / Integrations** | 7.6 (7 reviews) | 7.0 (9 reviews) | 8.2 (21 reviews) | 
| **Extensibility** | 6.7 (5 reviews) | 6.7 (8 reviews) | 8.3 (20 reviews) | 

#### Analysis

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Reporting and Analytics** | 7.3 (10 reviews) | 8.3 (9 reviews) | 9.0 (29 reviews) | 
| **Issue Tracking** | 6.5 (8 reviews) | 7.8 (9 reviews) | 9.2 (26 reviews) | 
| **Static Code Analysis** | Feature Not Available | 5.7 (7 reviews) | Feature Not Available | 
| **Vulnerability Scan** | 9.2 (10 reviews) | 8.9 (9 reviews) | 9.4 (29 reviews) | 
| **Code Analysis** | Not enough data | 6.0 (7 reviews) | 7.6 (18 reviews) | 

#### Testing

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Manual Testing** | Feature Not Available | 7.9 (7 reviews) | 7.1 (19 reviews) | 
| **Test Automation** | 9.0 (5 reviews) | 8.1 (8 reviews) | 8.5 (24 reviews) | 
| **Compliance Testing** | Feature Not Available | 7.1 (7 reviews) | 8.4 (23 reviews) | 
| **Black-Box Scanning** | 9.0 (10 reviews) | 8.7 (9 reviews) | 9.1 (21 reviews) | 
| **Detection Rate** | 7.9 (11 reviews) | 8.0 (9 reviews) | 8.6 (21 reviews) | 
| **False Positives** | 5.8 (11 reviews) | 7.6 (9 reviews) | 7.4 (21 reviews) | 

### Vulnerability Scanner

| Product | Score | Reviews |
|---|---|---|
| **Detectify** | 7.9/10 | 22 |
| **Pentest-Tools.com** | 7.7/10 | 32 |
| **Invicti (formerly Netsparker)** | 8.6/10 | 20 |

#### Performance

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Issue Tracking** | 8.5 (16 reviews) | 7.3 (28 reviews) | 8.6 (18 reviews) ✓ Verified | 
| **Detection Rate** | 8.5 (19 reviews) | 8.5 (30 reviews) | 9.0 (18 reviews) ✓ Verified | 
| **False Positives** | 6.3 (19 reviews) | 7.6 (29 reviews) | 7.9 (20 reviews) ✓ Verified | 
| **Automated Scans** | 8.9 (20 reviews) | 9.2 (31 reviews) | 9.1 (19 reviews) ✓ Verified | 

#### Network

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Compliance Testing** | 8.0 (11 reviews) | 7.6 (30 reviews) | 8.7 (14 reviews) ✓ Verified | 
| **Perimeter Scanning** | 8.3 (12 reviews) | 8.6 (30 reviews) | 8.6 (11 reviews) ✓ Verified | 
| **Configuration Monitoring** | 8.3 (10 reviews) | 7.6 (28 reviews) | 8.3 (11 reviews) ✓ Verified | 

#### Application

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Manual Application Testing** | Feature Not Available | 6.5 (29 reviews) | 8.2 (15 reviews) | 
| **Static Code Analysis** | 6.5 (9 reviews) | 5.9 (26 reviews) | 8.2 (15 reviews) ✓ Verified | 
| **Black Box Testing** | 8.2 (14 reviews) | 8.4 (27 reviews) | 9.2 (18 reviews) ✓ Verified | 

#### Agentic AI - Vulnerability Scanner

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 

### Software Composition Analysis

| Product | Score | Reviews |
|---|---|---|
| **Detectify** | N/A | N/A |
| **Pentest-Tools.com** | N/A | N/A |
| **Invicti (formerly Netsparker)** | N/A | N/A |

#### Functionality - Software Composition Analysis 

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Language Support** | Not enough data | Not enough data | Not enough data | 
| **Integration** | Not enough data | Not enough data | Not enough data | 
| **Transparency** | Not enough data | Not enough data | Not enough data | 

#### Effectiveness - Software Composition Analysis

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Remediation Suggestions** | Not enough data | Not enough data | Not enough data | 
| **Continuous Monitoring** | Not enough data | Not enough data | Not enough data | 
| **Thorough Detection** | Not enough data | Not enough data | Not enough data | 

### API Security

| Product | Score | Reviews |
|---|---|---|
| **Detectify** | N/A | N/A |
| **Pentest-Tools.com** | N/A | N/A |
| **Invicti (formerly Netsparker)** | N/A | N/A |

#### API Management 

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **API Discovery** | Not enough data | Not enough data | Feature Not Available | 
| **API Monitoring** | Not enough data | Not enough data | Feature Not Available | 
| **Reporting** | Not enough data | Not enough data | Feature Not Available | 
| **Change Management** | Not enough data | Not enough data | Feature Not Available | 

#### Security Testing

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Compliance Monitoring** | Not enough data | Not enough data | Feature Not Available | 
| **API Verification** | Not enough data | Not enough data | Feature Not Available | 
| **API Testing** | Not enough data | Not enough data | Not enough data | 

#### Security Management

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Security and Policy Enforcement** | Not enough data | Not enough data | Not enough data | 
| **Anomoly Detection** | Not enough data | Not enough data | Feature Not Available | 
| **Bot Detection** | Not enough data | Not enough data | Feature Not Available | 

### Attack Surface Management

| Product | Score | Reviews |
|---|---|---|
| **Detectify** | 9.5/10 | 6 |
| **Pentest-Tools.com** | N/A | N/A |
| **Invicti (formerly Netsparker)** | N/A | N/A |

#### Asset Management

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Asset Discovery** | 10.0 (5 reviews) | Not enough data | Not enough data | 
| **Shadow IT Detection** | Not enough data | Not enough data | Not enough data | 
| **Change Management** | Not enough data | Not enough data | Not enough data | 

#### Monitoring

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Gap Analysis** | Feature Not Available | Not enough data | Not enough data | 
| **Vulnerability Intelligence** | 9.0 (5 reviews) | Not enough data | Not enough data | 
| **Compliance Monitoring** | Not enough data | Not enough data | Not enough data | 
| **Continuous Monitoring** | 10.0 (6 reviews) | Not enough data | Not enough data | 

#### Risk Management

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Risk-Prioritization** | 9.3 (5 reviews) | Not enough data | Not enough data | 
| **Reconnaissance** | 9.3 (5 reviews) | Not enough data | Not enough data | 
| **At-Risk Analysis** | Feature Not Available | Not enough data | Not enough data | 
| **Threat Intelligence** | Not enough data | Not enough data | Not enough data | 

#### Generative AI

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **AI Text Summarization** | Not enough data | Not enough data | Not enough data | 

### Application Security Posture Management (ASPM)

| Product | Score | Reviews |
|---|---|---|
| **Detectify** | N/A | N/A |
| **Pentest-Tools.com** | N/A | N/A |
| **Invicti (formerly Netsparker)** | N/A | N/A |

#### Risk management - Application Security Posture Management (ASPM)

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Vulnerability Management** | Not enough data | Not enough data | Not enough data | 
| **Risk Assessment and Prioritization** | Not enough data | Not enough data | Not enough data | 
| **Compliance Management** | Not enough data | Not enough data | Not enough data | 
| **Policy Enforcement** | Not enough data | Not enough data | Not enough data | 

#### Integration and efficiency - Application Security Posture Management (ASPM)

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Integration with Development Tools** | Not enough data | Not enough data | Not enough data | 
| **Automation and Efficiency** | Not enough data | Not enough data | Not enough data | 

#### Reporting and Analytics - Application Security Posture Management (ASPM)

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Trend Analysis** | Not enough data | Not enough data | Not enough data | 
| **Risk Scoring** | Not enough data | Not enough data | Not enough data | 
| **Customizable Dashboards** | Not enough data | Not enough data | Not enough data | 

#### Agentic AI  - Application Security Posture Management (ASPM)

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Multi-step Planning** | Not enough data | Not enough data | Not enough data | 

### Exposure Management Platforms

| Product | Score | Reviews |
|---|---|---|
| **Detectify** | N/A | N/A |
| **Pentest-Tools.com** | N/A | N/A |
| **Invicti (formerly Netsparker)** | N/A | N/A |

#### Generative AI - Exposure Management Platforms

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Predictive Analytics** | Not enough data | Not enough data | Not enough data | 
| **Automated Threat Detection** | Not enough data | Not enough data | Not enough data | 

#### Risk Identification and Assessment - Exposure Management Platforms

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Comprehensive Risk Assessment** | Not enough data | Not enough data | Not enough data | 
| **Advanced Analytics and Reporting** | Not enough data | Not enough data | Not enough data | 

#### Monitoring and Integration - Exposure Management Platforms

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Integration and Data Consolidation** | Not enough data | Not enough data | Not enough data | 
| **Real-time Monitoring and Alerts** | Not enough data | Not enough data | Not enough data | 

### Static Code Analysis

| Product | Score | Reviews |
|---|---|---|
| **Detectify** | N/A | N/A |
| **Pentest-Tools.com** | N/A | N/A |
| **Invicti (formerly Netsparker)** | N/A | N/A |

#### Agentic AI - Static Code Analysis

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Adaptive Learning** | Not enough data | Not enough data | Not enough data | 
| **Natural Language Interaction** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 

### Cloud Security

| Product | Score | Reviews |
|---|---|---|
| **Detectify** | N/A | N/A |
| **Pentest-Tools.com** | N/A | N/A |
| **Invicti (formerly Netsparker)** | N/A | N/A |

#### Cloud Visibility

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Data Discovery** | Not enough data | Not enough data | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | Not enough data | Not enough data | 

#### Security

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Data Security** | Not enough data | Not enough data | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | Not enough data | 
| **Security Auditing** | Not enough data | Not enough data | Not enough data | 

#### Identity

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **SSO** | Not enough data | Not enough data | Not enough data | 
| **Governance** | Not enough data | Not enough data | Not enough data | 
| **User Analytics** | Not enough data | Not enough data | Not enough data | 

### Interactive Application Security Testing (IAST)

| Product | Score | Reviews |
|---|---|---|
| **Detectify** | N/A | N/A |
| **Pentest-Tools.com** | N/A | N/A |
| **Invicti (formerly Netsparker)** | N/A | N/A |

#### Agentic AI - Interactive Application Security Testing (IAST)

| Feature | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 

---
## Categories
**Shared Categories (4):** [Dynamic Application Security Testing (DAST) Software](https://www.g2.com/categories/dynamic-application-security-testing-dast), [Penetration Testing Tools](https://www.g2.com/categories/penetration-testing-tools), [Website Security Software](https://www.g2.com/categories/website-security), [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner)

**Unique to Detectify (2):** [Exposure Management Platforms](https://www.g2.com/categories/exposure-management-platforms), [ Attack Surface Management Software](https://www.g2.com/categories/attack-surface-management)


**Unique to Invicti (formerly Netsparker) (6):** [API Security Tools](https://www.g2.com/categories/api-security), [Static Application Security Testing (SAST) Software](https://www.g2.com/categories/static-application-security-testing-sast), [Software Composition Analysis Tools](https://www.g2.com/categories/software-composition-analysis), [Static Code Analysis Tools](https://www.g2.com/categories/static-code-analysis), [Interactive Application Security Testing (IAST) Software](https://www.g2.com/categories/interactive-application-security-testing-iast), [Application Security Posture Management (ASPM) Software](https://www.g2.com/categories/application-security-posture-management-aspm)


---
## Reviewer Demographics

### By Company Size

| Segment | Detectify | Pentest-Tools.com | Invicti (formerly Netsparker) | 
|---|---|---|---|
| **Small-Business** | 47.9% | 67.4% | 23.1% | 
| **Mid-Market** | 35.4% | 21.1% | 29.2% | 
| **Enterprise** | 16.7% | 11.6% | 47.7% | 

### By Industry

#### Detectify

- **Information Technology and Services:** 20.8%
- **Computer Software:** 14.6%
- **Computer &amp; Network Security:** 6.3%
- **Retail:** 4.2%
- **Higher Education:** 4.2%
- **Gambling &amp; Casinos:** 4.2%
- **Financial Services:** 4.2%
- **Apparel &amp; Fashion:** 2.1%
- **Automotive:** 2.1%
- **Business Supplies and Equipment:** 2.1%
- **Other:** 35.4%

#### Pentest-Tools.com

- **Computer &amp; Network Security:** 26.3%
- **Information Technology and Services:** 18.9%
- **Computer Software:** 10.5%
- **Financial Services:** 4.2%
- **Consulting:** 3.2%
- **Telecommunications:** 3.2%
- **Health, Wellness and Fitness:** 2.1%
- **Internet:** 2.1%
- **Construction:** 2.1%
- **Mechanical or Industrial Engineering:** 2.1%
- **Other:** 25.3%

#### Invicti (formerly Netsparker)

- **Computer Software:** 12.3%
- **Telecommunications:** 10.8%
- **Financial Services:** 9.2%
- **Information Technology and Services:** 9.2%
- **Computer &amp; Network Security:** 6.2%
- **Internet:** 6.2%
- **Insurance:** 4.6%
- **Automotive:** 3.1%
- **Consumer Goods:** 3.1%
- **Education Management:** 3.1%
- **Other:** 32.3%

---
## Alternatives

### Alternatives to Detectify

- [Intruder](https://www.g2.com/products/intruder/reviews) — 4.8/5 stars (206 reviews)
- [Acunetix by Invicti](https://www.g2.com/products/acunetix-by-invicti/reviews) — 4.1/5 stars (105 reviews)
- [Tenable Nessus](https://www.g2.com/products/tenable-nessus/reviews) — 4.5/5 stars (301 reviews)
- [Burp Suite](https://www.g2.com/products/burp-suite/reviews) — 4.8/5 stars (129 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (784 reviews)
- [GitLab](https://www.g2.com/products/gitlab/reviews) — 4.5/5 stars (890 reviews)
- [Cloudflare Application Security and Performance](https://www.g2.com/products/cloudflare-application-security-and-performance/reviews) — 4.5/5 stars (600 reviews)
- [Scrut Automation](https://www.g2.com/products/scrut-automation/reviews) — 4.9/5 stars (1300 reviews)
- [Red Hat Ansible Automation Platform](https://www.g2.com/products/red-hat-ansible-automation-platform/reviews) — 4.6/5 stars (376 reviews)
- [Gearset DevOps](https://www.g2.com/products/gearset-devops/reviews) — 4.7/5 stars (292 reviews)

### Alternatives to Pentest-Tools.com

- [Intruder](https://www.g2.com/products/intruder/reviews) — 4.8/5 stars (206 reviews)
- [Acunetix by Invicti](https://www.g2.com/products/acunetix-by-invicti/reviews) — 4.1/5 stars (105 reviews)
- [Tenable Nessus](https://www.g2.com/products/tenable-nessus/reviews) — 4.5/5 stars (301 reviews)
- [Beagle Security](https://www.g2.com/products/beagle-security/reviews) — 4.7/5 stars (88 reviews)
- [Burp Suite](https://www.g2.com/products/burp-suite/reviews) — 4.8/5 stars (129 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (784 reviews)
- [GitLab](https://www.g2.com/products/gitlab/reviews) — 4.5/5 stars (890 reviews)
- [Cloudflare Application Security and Performance](https://www.g2.com/products/cloudflare-application-security-and-performance/reviews) — 4.5/5 stars (600 reviews)
- [Red Hat Ansible Automation Platform](https://www.g2.com/products/red-hat-ansible-automation-platform/reviews) — 4.6/5 stars (376 reviews)
- [Gearset DevOps](https://www.g2.com/products/gearset-devops/reviews) — 4.7/5 stars (292 reviews)

### Alternatives to Invicti (formerly Netsparker)

- [Intruder](https://www.g2.com/products/intruder/reviews) — 4.8/5 stars (206 reviews)
- [Veracode Application Security Platform](https://www.g2.com/products/veracode-application-security-platform/reviews) — 3.8/5 stars (25 reviews)
- [Tenable Nessus](https://www.g2.com/products/tenable-nessus/reviews) — 4.5/5 stars (301 reviews)
- [HCL AppScan](https://www.g2.com/products/hcl-appscan/reviews) — 4.1/5 stars (76 reviews)
- [Burp Suite](https://www.g2.com/products/burp-suite/reviews) — 4.8/5 stars (129 reviews)
- [GitLab](https://www.g2.com/products/gitlab/reviews) — 4.5/5 stars (890 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (784 reviews)
- [Postman](https://www.g2.com/products/postman/reviews) — 4.6/5 stars (1768 reviews)
- [GitHub](https://www.g2.com/products/github/reviews) — 4.7/5 stars (2345 reviews)
- [Cloudflare Application Security and Performance](https://www.g2.com/products/cloudflare-application-security-and-performance/reviews) — 4.5/5 stars (600 reviews)

---
## Top Discussions

### Detectify

- Title: [Do we have a solution to exclude or tag the findings that have been already reviewed?](https://www.g2.com/discussions/38747-do-we-have-a-solution-to-exclude-or-tag-the-findings-that-have-been-already-reviewed) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "Hi Francesco, 

Thanks for your question. In the deep scan results you can tag findings as &quot;fixed&quot;. There you can also filter by the &quot;new&quot; tag. To be able..."

### Pentest-Tools.com

- Title: [How do you perform a VAPT?](https://www.g2.com/discussions/how-do-you-perform-a-vapt) — 1 comment *(includes official response)*
  > **Top comment:** "VAPT, or Vulnerability Assessment and Penetration Testing, is a vital security testing process that organizations use to identify and remediate..."
- Title: [What are the security testing tools?](https://www.g2.com/discussions/what-are-the-security-testing-tools) — 1 comment *(includes official response)*
  > **Top comment:** "If you want to ensure the safety and security of your software applications, offensive security testing is crucial. But with so many security testing tools..."
- Title: [What are VAPT tools?](https://www.g2.com/discussions/what-are-vapt-tools) — 1 comment *(includes official response)*
  > **Top comment:** "VAPT tools, or Vulnerability Assessment and Penetration Testing tools, are an essential set of software applications used by ethical hackers to identify and..."
- Title: [What is Pentest tool?](https://www.g2.com/discussions/what-is-pentest-tool) — 1 comment *(includes official response)*
  > **Top comment:** "Pentest-Tools.com is a cloud-based solution for offensive security testing, created for infosec professionals.

Focused on web applications and network..."

### Invicti (formerly Netsparker)

- Title: [What is Invicti (formerly Netsparker) used for?](https://www.g2.com/discussions/what-is-invicti-formerly-netsparker-used-for) — 1 comment
  > **Top comment:** "Dynamic application Security Scanning - DAST Scan"
- Title: [What are URL rewrites and URL rewrite rules?](https://www.g2.com/discussions/netsparker-web-application-security-scanner-96cf6c3d-02fc-4405-a800-e28a0f893517) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "Web application developers use URL Rewrite Rules to hide parameters in the URL directory structure and is typically used to make it easier for search engines..."
- Title: [What is the Knowledge base node and what is reported in it?](https://www.g2.com/discussions/netsparker-web-application-security-scanner) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "Netsparker Desktop and Netsparker Cloud are not just web vulnerability scanners that automatically identify vulnerabilities in web applications. They are all..."
- Title: [How Does Netsparker Integrate with Your Existing SDLC?](https://www.g2.com/discussions/netsparker-scanners-faqs-e4a57e60-032c-4486-a798-94cc2b423ed8) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "We developed the TeamCity, Jenkins and Bamboo plugins to help you complete the Netsparker Cloud-assisted SDLC. Using our plugins, users with Administration..."
- Title: [What are the Plans &amp; Editions of Netsparker?](https://www.g2.com/discussions/netsparker-scanners-faqs-7c0a080f-a51b-479a-9fd4-47828171f241) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "The New Netsparker Plans:

Netsparker Standard – this plan includes Netsparker Desktop, which allows you to scan up to 20 websites
Netsparker Team – this..."

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/detectify-vs-pentest-tools-com-vs-invicti-formerly-netsparker)

