Top Rated Darwin Attack Alternatives
37 Darwin Attack Reviews
Overall Review Sentiment for Darwin Attack
Log in to view review sentiment.
UI makes it easy to sort through vulnerabilities to view them per host or to take a glance as a whole. The summary findings are helpful to get an idea of the main issues with the environment but each vulnerability also has detailed info on a per-finding basis that's easy to view. Marking risks as accepted or remediated can be done as bulk actions on findings, so it doesn't take a lot of time at all to update a report. The search and filter options are good and can include all previous reports or only specific ones. The activity feed is handy to view the timeline of actions taken. Review collected by and hosted on G2.com.
Filtering is slow when going a lot or reports. Sometimes searching or marking a lot of findings can cause the portal to hang and need to refresh to restart the query. Review collected by and hosted on G2.com.
It's easy to use, and the report/results they deliver are categorized nicely and are easy to understand. They have great support too. Review collected by and hosted on G2.com.
I can't really think of anything I disliked. Review collected by and hosted on G2.com.
The new Darwin Attack platform interface is straightforward and easy to navigate. I readily identified the process for working through each identified vulnerability. Review collected by and hosted on G2.com.
Some files I tried to upload were not allowed by the platform when posting on individual vulnerabilities. A list of what is allowed and not allowed for the different types of posts when choosing to upload would be helpful. Review collected by and hosted on G2.com.
Firstly, I was impressed with the level of professionalism and expertise displayed by the team at Evolve. They were able to identify potential vulnerabilities in our system that we weren't even aware of, which was very reassuring as we strive to keep our data secure.
The use of the Darwin Attack tool by Evolve was particularly impressive. It allowed for a more comprehensive analysis of our security system, and the results were clear and easy to understand. I appreciated the level of detail in the report provided by Evolve, which made it easy for us to take appropriate action to address any weaknesses.
The communication from Evolve throughout the testing process was also exceptional. They were responsive to any questions or concerns we had, and were always clear and concise in their explanations. The team was also very respectful of our time, and ensured that the testing process did not disrupt our day-to-day operations.
Overall, I would highly recommend Evolve and their Darwin Attack pen test security tool to any company looking for top-notch cybersecurity testing. The level of expertise, professionalism, and clear communication displayed by the team at Evolve was truly impressive, and gave us confidence in our security measures. Thank you, Evolve! Review collected by and hosted on G2.com.
Darwin Attack is a powerful and comprehensive penetration testing tool that is widely used in the cybersecurity industry to identify vulnerabilities in computer systems and networks. It is known for its advanced capabilities and ability to simulate real-world attack scenarios, which can help organizations improve their security posture and protect against cyber threats. However, like any technology or software tool, Darwin Attack may not be suitable for every organization's specific needs or preferences, so it's important to evaluate it based on your specific requirements and goals. Ultimately, it's best to consult with a cybersecurity expert to determine the best approach to securing your systems and networks. Review collected by and hosted on G2.com.
The Darwin Attack platform is very easy to navigate and understand. I find the layout very user-friendly. Review collected by and hosted on G2.com.
I haven't found any big downsides of the Darwin Attack platform. Review collected by and hosted on G2.com.

- Being able to visualize categories (Nests) as well as drill down into individual vulnerabilities
- Timely and secure communication between the testing team and our organization
- The ability to generate a client-facing letter that shows our internal and external stakeholders that we take security seriously
- Most vulnerabilities found came with detailed remediation suggestions; significantly reducing the additional research required from my team Review collected by and hosted on G2.com.
- limited authenticator options for logging into the system (minor inconvenience) Review collected by and hosted on G2.com.
Darwin Attack's UI is clean and easy to navigate. The new "timeline"-like feature adds a simple, secure way to communicate with the Evolve team, allowing users to quickly and simply reference specific projects in each message.
Also, the file downloads/uploads tab contains all project files from both the client and Evolve, making it easy to retrieve completed reports and upload documents related to upcoming engagements. Review collected by and hosted on G2.com.
As a customer of Evolve, I've yet to find anything in the Darwin Attack portal that isn't useful or helpful. All the information I need to reference to create documentation for my employer is centrally located and tidily organized. Review collected by and hosted on G2.com.
Summarized view of vulnerabilities. The news feed with the easy ability to communicate with the team. Ability to review and track future and past projects detailing the vulns found. Review collected by and hosted on G2.com.
A few things we would love to see in the application are; the lack of ability to link external tickets to each vulnerability, when having the same assets (different ports) causes multiple vulns in the view so it shows higher numbers. Lastly, the inability to specify each asset as internal and external, meaning we have IPs for our test environments and IPs for our production environment and have the ability to decipher between the two easily would allow for prioritizing which issues to fix sooner. Review collected by and hosted on G2.com.
A real world opportunity to asses our security posture. Potentially uncovering areas we were unaware of or need more focus. Review collected by and hosted on G2.com.
I have nothing negative to say about the service itself, except that we live in a place where this is even necessary. Review collected by and hosted on G2.com.