This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Defensics Reviews & Product Details

Profile Status

This profile is currently managed by Defensics but has limited features.

Are you part of the Defensics team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Defensics before?

Answer a few questions to help the Defensics community

Defensics Reviews (3)

Reviews

Defensics Reviews (3)

4.2
3 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Computer & Network Security
CC
Enterprise (> 1000 emp.)
"Best Protocol Fuzzer"
What do you like best about Defensics?

Defensics helps us toh identify the protocol level vulnerability . Awesome IP stack breaker when it comes to fuzzing the protocol Review collected by and hosted on G2.com.

What do you dislike about Defensics?

Integration Part : Loding the suites and making the server up takes a lot of time . Don't have any details documentation regarding the protocol used for defensics Review collected by and hosted on G2.com.

Verified User in Electrical/Electronic Manufacturing
CE
Enterprise (> 1000 emp.)
"Great tool to test the Protocols. "
What do you like best about Defensics?

One of the great product of synopsys. With the help of synopsys defensics we can test the protocols and it will provide the accurate results of the test and helps in our OT testing of the devices. It contains all the protocols which we need in our testing. Major part of this tool is its having bunch of test cases. Review collected by and hosted on G2.com.

What do you dislike about Defensics?

In synopsys defensics we cannot buy multiple licences for single protocol and we have to wait for complete the test its takes more time to complete minimum one day for one protocol. Review collected by and hosted on G2.com.

Verified User in Security and Investigations
US
Enterprise (> 1000 emp.)
"Defensics for fuzz testing REST APIs"
What do you like best about Defensics?

It's relatively easy to get started. The tool allow extending it using Java or Python so you can test virtually any system. Reporting is great: you can easily know which anomalous input caused an error to reproduce and fix it. Review collected by and hosted on G2.com.

What do you dislike about Defensics?

The tool works best in case you're testing a protocol for which there's a built-in fuzzer. In case you choose to use a generic fuzzer like the Universal Fuzzer and add you're own logic then the usefulness of the tool is greatly reduced. Testing REST APIs which have good input validation (like JSON schema validation) won't typically yield much result. Review collected by and hosted on G2.com.

There are not enough reviews of Defensics for G2 to provide buying insight. Below are some alternatives with more reviews:

1
vPenTest Logo
vPenTest
4.6
(229)
vPenTest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable, accurate, faster, consistent, and not prone to human error. vPenTest essentially combines the knowledge, methodologies, techniques, and commonly used tools of multiple consultants into a single platform that consistently exceeds expectations of a penetration test. By developing our proprietary framework that continuously grows based on our research & development, we’re able to modernize the way penetration tests are conducted.
2
Intruder Logo
Intruder
4.8
(206)
Intruder is a proactive security monitoring platform for internet-facing systems.
3
Astra Pentest Logo
Astra Pentest
4.6
(175)
Astra security is a cybersecurity company that provides multiple features of protecting your website or company online. The comprehensive suite efficiently helps uncover vulnerabilities in thousands of apps & networks. Preventing data breaches and network compromise. 🧑‍💻 It offers Vulnerability Assessment and Penetration Testing (VAPT) for Website/Web App, Mobile App, SaaS, APIs, Cloud Infrastructure (AWS/Azure/GCP), Network Devices (Firewall, Router, Server, Switch, Printer, Camera, etc), Blockchain/Smart Contract, and more. ✨ Key highlighted features of Astra Pentest Suite: - A shiny bright dashboard that displays managed automated & manual pentesting - More than 2500+ security tests - Detailed Vulnerability Scanning & Reporting - Easy Vulnerability Management - Industry Recognized Verifiable VAPT Certificate ⚡️ Other features: - OWASP, SANS 25 standard testing - One-click actions for report download, email & more - CXO & developer-friendly dashboard - Contextual bug fix collaboration between your developers & security team
4
Cobalt Logo
Cobalt
4.5
(168)
Cobalt's Pen Testing as a Service (PTaaS) Platform transforms yesterday’s broken pen test model into a data-driven vulnerability management engine. Fueled by our global talent pool of certified freelancers, Cobalt's crowdsourced SaaS pen test platform delivers actionable results that empower agile teams to pinpoint, track, and remediate software vulnerabilities. Hundreds of organizations now benefit from high quality pen test findings, faster remediation times, and higher ROI for their pen test budget.
5
Acunetix by Invicti Logo
Acunetix by Invicti
4.1
(105)
Acunetix by Invicti automatically crawls and scans off-the-shelf and custom-built websites and web applications for SQL Injection, XSS, XXE, SSRF, Host Header Attacks & over 3000 other web vulnerabilities. It also provides a wide variety of reports to help developers and business owners alike to quickly identify a web application’s threat surface, detect what needs to be fixed, and ensure conformance with several compliance standards.
6
Pentera Logo
Pentera
4.5
(143)
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io.
7
Aikido Security Logo
Aikido Security
4.6
(138)
Aikido Security is a developer-first software security platform. We scan your source code & cloud to show you which vulnerabilities are actually important to solve. Triaging is sped up by massively reducing false-positives and making CVEs human-readable. Aikido makes it simple to keep your product secure and gives you back time to do what youdo best: writing code.
8
Burp Suite Logo
Burp Suite
4.8
(127)
Burp Suite is a toolkit for web application security testing.
9
Oneleet Logo
Oneleet
4.9
(125)
Oneleet provides a full-coverage cybersecurity platform through which companies can build, manage, and monitor their cybersecurity management program. The company's core product offers a roadmap for companies to become secure and build trust with their partners.
10
Pentest-Tools.com Logo
Pentest-Tools.com
4.8
(100)
Pentest-Tools.com helps security professionals find, validate, and communicate vulnerabilities faster and with greater confidence - whether they’re internal teams defending at scale, MSPs juggling clients, or consultants under pressure. With comprehensive coverage across network, web, API, and cloud assets, and built-in exploit validation, it turns every scan into credible, actionable insight. Trusted by over 2,000 teams in 119 countries and used in more than 6 million scans annually, it delivers speed, clarity, and control - without bloated stacks or rigid workflows.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Defensics