Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Paid
Claimed

StackHawk Features

What are the features of StackHawk?

Administration

  • API / Integrations
  • Extensibility

Analysis

  • Reporting and Analytics
  • Issue Tracking
  • Vulnerability Scan

Testing

  • Manual Testing
  • Test Automation
  • Compliance Testing
  • Black-Box Scanning
  • Detection Rate
  • False Positives

Performance

  • Issue Tracking
  • Detection Rate
  • False Positives
  • Automated Scans

Filter for Features

Administration

API / Integrations

As reported in 11 StackHawk reviews. Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications.
94%
(Based on 11 reviews)

Extensibility

Provides the ability to extend the platform to include additional features and functionalities

Not enough data

Reporting and Analytics

Based on 11 StackHawk reviews. Tools to visualize and analyze data.
94%
(Based on 11 reviews)

API / Integrations

Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications. 27 reviewers of StackHawk have provided feedback on this feature.
89%
(Based on 27 reviews)

Extensibility

Based on 26 StackHawk reviews. Provides the ability to extend the platform to include additional features and functionalities
86%
(Based on 26 reviews)

Analysis

Issue Tracking

Track issues and manage resolutions. 10 reviewers of StackHawk have provided feedback on this feature.
92%
(Based on 10 reviews)

Reconnaissance

Gathers information about the system and potential exploits to be tested.

Not enough data

Vulnerability Scan

Scans applications and networks for known vulnerabilities, holes and exploits.

Not enough data

Reporting and Analytics

As reported in 30 StackHawk reviews. Tools to visualize and analyze data.
83%
(Based on 30 reviews)

Issue Tracking

Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. This feature was mentioned in 26 StackHawk reviews.
83%
(Based on 26 reviews)

Vulnerability Scan

As reported in 29 StackHawk reviews. Scans applications and networks for known vulnerabilities, holes and exploits.
91%
(Based on 29 reviews)

Testing

Command-Line Tools

Allows users to access a terminal host system and input command sequences. 10 reviewers of StackHawk have provided feedback on this feature.
92%
(Based on 10 reviews)

Manual Testing

As reported in 11 StackHawk reviews. Allows users to perfrom hands-on live simulations and penetration tests.
91%
(Based on 11 reviews)

Test Automation

As reported in 10 StackHawk reviews. Runs pre-scripted security tests without requiring manual work.
93%
(Based on 10 reviews)

Performance and Reliability

Software is consistently available (uptime) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took. 10 reviewers of StackHawk have provided feedback on this feature.
93%
(Based on 10 reviews)

Manual Testing

Based on 27 StackHawk reviews. Allows users to perfrom hands-on live simulations and penetration tests.
73%
(Based on 27 reviews)

Test Automation

As reported in 29 StackHawk reviews. Runs pre-scripted security tests without requiring manual work.
88%
(Based on 29 reviews)

Compliance Testing

As reported in 27 StackHawk reviews. Allows users to test applications for specific compliance requirements.
80%
(Based on 27 reviews)

Black-Box Scanning

Scans functional applications externally for vulnerabilities like SQL injection or XSS. This feature was mentioned in 26 StackHawk reviews.
85%
(Based on 26 reviews)

Detection Rate

The rate at which scans accurately detect all vulnerabilities associated with the target. This feature was mentioned in 29 StackHawk reviews.
82%
(Based on 29 reviews)

False Positives

The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. 29 reviewers of StackHawk have provided feedback on this feature.
74%
(Based on 29 reviews)

Performance

Issue Tracking

Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. 21 reviewers of StackHawk have provided feedback on this feature.
83%
(Based on 21 reviews)

Detection Rate

Based on 22 StackHawk reviews. The rate at which scans accurately detect all vulnerabilities associated with the target.
87%
(Based on 22 reviews)

False Positives

The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. This feature was mentioned in 22 StackHawk reviews.
77%
(Based on 22 reviews)

Automated Scans

Based on 25 StackHawk reviews. Runs pre-scripted vulnerability scans without requiring manual work.
87%
(Based on 25 reviews)

Network

Compliance Testing

Allows users to scan applications and networks for specific compliance requirements. 19 reviewers of StackHawk have provided feedback on this feature.
82%
(Based on 19 reviews)

Application

Manual Application Testing

As reported in 21 StackHawk reviews. Allows users to perfrom hands-on live simulations and penetration tests.
82%
(Based on 21 reviews)

Black Box Testing

Based on 18 StackHawk reviews. Scans functional applications externally for vulnerabilities like SQL injection or XSS.
86%
(Based on 18 reviews)

API Management

API Discovery

Detects new and undocumented assets as they enter a network and add them to asset inventory.

Not enough data

API Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Reporting

As reported in 10 StackHawk reviews. Provides results of the simulation and reveals potential security gaps or vulnerabilitites.
77%
(Based on 10 reviews)

Change Management

Tools to track and implement required security policy changes.

Not enough data

Security Testing

Compliance Monitoring

Monitors data quality and send alerts based on violations or misuse.

Not enough data

API Verification

Allows users to set customizable API verification settings to improve security requirements.

Not enough data

API Testing

As reported in 10 StackHawk reviews. Runs pre-scripted security tests without requiring manual work.
93%
(Based on 10 reviews)

Security Management

Security and Policy Enforcement

Abilities to set standards for network, application, and API security risk management.

Not enough data

Anomoly Detection

Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Bot Detection

Monitors for and rids systems of bots suspected of committing fraud or abusing applications.

Not enough data