Best Software for 2025 is now live!
Product Avatar Image

Pentest-Tools.com

Show rating breakdown
95 reviews
  • 1 profiles
  • 4 categories
Average star rating
4.8
Serving customers since
2013

Profile Name

Star Rating

84
12
0
0
0

Pentest-Tools.com Reviews

Review Filters
Profile Name
Star Rating
84
12
0
0
0
Manos G.
MG
Manos G.
07/18/2024
Validated Reviewer
Verified Current User
Review source: Organic

Amazing pen test tools and reporting ! Beautiful crafted exploits

Ease of scope , organise workspaces , time efficiency , easy reporting , grouping of targets and threat analysis . All links for CVEs are there and pentest made easy. Great features to help you and compliment your manual pentetest, either is black box or gray box
Avi S.
AS
Avi S.
Intern@RedeemX | GRC and Blue Teaming Enthusiast!
07/11/2024
Validated Reviewer
Review source: Organic

Pretty Useful and Simple

It is super simple and provides detailed results which don't need much modfiying to present.
William D.
WD
William D.
U.S. Navy Veteran & AI Personalities ChatGPT Developer | Cybersecurity MBA | Specializing in IT Security & Cyber Resilience | Proven Expert in Threat Mitigation & Log Analysis
07/01/2024
Validated Reviewer
Verified Current User
Review source: Organic

Truly a Godsend

What I like best about Pentest-Tools.com is the speed and accuracy in the detection of vulnerabilities like never before. The friendly user interface makes navigation easy, hence the effortless setting up of any scan—even for beginners.

About

Contact

HQ Location:
Sectorul 1, Bucharest

Social

@pentesttoolscom

What is Pentest-Tools.com?

Get a hacker's perspective on your web apps, network, and cloud!Pentest-Tools.com helps security teams run the key steps of a penetration test, easily and without expert hacking skills.Headquartered in Europe (Bucharest, Romania), Pentest-Tools.com makes offensive cybersecurity tools and proprietary vulnerability scanner software for penetration testers and other infosec pros.Security teams use our toolkit to identify paths attackers can use to compromise your organization so you can effectively reduce your exposure to cyberattacks.

Details

Year Founded
2013