Best Software for 2025 is now live!

Top Free Breach and Attack Simulation (BAS) Software

Check out our list of free Breach and Attack Simulation (BAS) Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Breach and Attack Simulation (BAS) Software to ensure you get the right product.

View Free Breach and Attack Simulation (BAS) Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
6 Breach and Attack Simulation (BAS) Products Available
(172)4.7 out of 5
4th Easiest To Use in Breach and Attack Simulation (BAS) software
View top Consulting Services for vPenTest
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vonahi Security is building the future of offensive cybersecurity consulting services through automation. vPenTest from Vonahi is a SaaS platform that fully replicates manual internal and external net

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 74% Small-Business
    • 23% Mid-Market
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    vPenTest is a very affordable and fully automated penetration testing solution that allows our business to provide penetration testing services to... Read review
    Verified User in Information Technology and Services
    AI
    vPenTest is easy to configure and use. The ability to setup the internal pentration appliances, even on a device as small as a Raspberry Pi, makes... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,684 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,835 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Vonahi Security is building the future of offensive cybersecurity consulting services through automation. vPenTest from Vonahi is a SaaS platform that fully replicates manual internal and external net

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 74% Small-Business
  • 23% Mid-Market
Verified User in Information Technology and Services
AI
vPenTest is a very affordable and fully automated penetration testing solution that allows our business to provide penetration testing services to... Read review
Verified User in Information Technology and Services
AI
vPenTest is easy to configure and use. The ability to setup the internal pentration appliances, even on a device as small as a Raspberry Pi, makes... Read review
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,684 Twitter followers
LinkedIn® Page
www.linkedin.com
4,835 employees on LinkedIn®
(57)4.7 out of 5
2nd Easiest To Use in Breach and Attack Simulation (BAS) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Small-Business
    • 35% Mid-Market
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ryan J.
    RJ
    Defendify explains each part of the security process. You don't need expertise. They will guide you in best practices and provide templates for... Read review
    Verified User in Marketing and Advertising
    AM
    Defendify has a full suite of Cybersecurity products that are easy to manage and cover a range of IT needs. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Defendify
    Year Founded
    2017
    HQ Location
    Portland, Maine
    Twitter
    @defendify
    315 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Small-Business
  • 35% Mid-Market
Ryan J.
RJ
Defendify explains each part of the security process. You don't need expertise. They will guide you in best practices and provide templates for... Read review
Verified User in Marketing and Advertising
AM
Defendify has a full suite of Cybersecurity products that are easy to manage and cover a range of IT needs. Read review
Seller Details
Seller
Defendify
Year Founded
2017
HQ Location
Portland, Maine
Twitter
@defendify
315 Twitter followers
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Picus Security Control Validation and Mitigation is a threat-centric, flexible platform that allows to measure security effectiveness and quickly assess controls, automatically and consistently identi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Enterprise
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • M
    In the security sector, we used to be able to provide a solution by putting a firewall. Now the risk factors have increased a lot, so we have... Read review
    Verified User in Information Technology and Services
    CI
    It answers the question are we vulnerable to these attacks Ease of integration Ease of simulating attacks on network email and more It gives... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @PicusSecurity
    2,673 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    227 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Picus Security Control Validation and Mitigation is a threat-centric, flexible platform that allows to measure security effectiveness and quickly assess controls, automatically and consistently identi

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Enterprise
M
In the security sector, we used to be able to provide a solution by putting a firewall. Now the risk factors have increased a lot, so we have... Read review
Verified User in Information Technology and Services
CI
It answers the question are we vulnerable to these attacks Ease of integration Ease of simulating attacks on network email and more It gives... Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@PicusSecurity
2,673 Twitter followers
LinkedIn® Page
www.linkedin.com
227 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 35% Enterprise
    • 35% Small-Business
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • ADESH J.
    AJ
    I would like to inform you that, I used IBM Randori Recon install and configure in linux server over nagios monitoring tool, its very easy to use... Read review
    Parth S.
    PS
    I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Waltham, Massachusetts
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 35% Enterprise
  • 35% Small-Business
ADESH J.
AJ
I would like to inform you that, I used IBM Randori Recon install and configure in linux server over nagios monitoring tool, its very easy to use... Read review
Parth S.
PS
I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use... Read review
Seller Details
Year Founded
2018
HQ Location
Waltham, Massachusetts
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FourCore ATTACK provides a comprehensive view of security effectiveness by validating controls with realistic attacks. • Identify gaps in endpoint, email and network security controls before real att

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Sumukha B.
    SB
    It has amazing features, great UI dashboard and very much useful in assessing security and firewall ability to prevent threat atacks by launching... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    FourCore
Product Description
How are these determined?Information
This description is provided by the seller.

FourCore ATTACK provides a comprehensive view of security effectiveness by validating controls with realistic attacks. • Identify gaps in endpoint, email and network security controls before real att

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Sumukha B.
SB
It has amazing features, great UI dashboard and very much useful in assessing security and firewall ability to prevent threat atacks by launching... Read review
Seller Details
Seller
FourCore
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Meet Chariot.Your Continuous Threat Exposure Management Workhorse. Chariot provides unparalleled security coverage by combining attack surface management, vulnerability management, breach and attack s

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @praetorianlabs
    8,227 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Meet Chariot.Your Continuous Threat Exposure Management Workhorse. Chariot provides unparalleled security coverage by combining attack surface management, vulnerability management, breach and attack s

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Twitter
@praetorianlabs
8,227 Twitter followers
LinkedIn® Page
www.linkedin.com