We performed a comparison between Invicti and ShiftLeft based on real PeerSpot user reviews.
Find out what your peers are saying about Sonar, Veracode, Checkmarx and others in Application Security Tools."Attacking feature: Actually, attacking is not a solo feature. It contains many attack engines, Hawk, and many properties. But Netsparker's attacking mechanism is very flexible. This increases the vulnerability detection rate. Also, Netsparker made the Hawk for real-time interactive command-line-based exploit testing. It's very valuable for a vulnerability scanner."
"The best features of Invicti are its ability to confirm access vulnerabilities, SSL injection vulnerabilities, and its connectors to other security tools."
"Invicti's best feature is the ability to identify vulnerabilities and manually verify them."
"The most attractive feature was the reporting review tool. The reporting review was very impressive and produced very fruitful reports."
"Invicti is a good product, and its API testing is also good."
"Crawling feature: Netsparker has very detail crawling steps and mechanisms. This feature expands the attack surface."
"One of the features I like about this program is the low number of false positives and the support it offers."
"The scanner and the result generator are valuable features for us."
"When it comes to ShiftLeft, the most valuable feature is definitely its ease of use and cost-effectiveness."
"I think that it freezes without any specific reason at times. This needs to be looked into."
"It would be better for listing and attacking Java-based web applications to exploit vulnerabilities."
"The scanner itself should be improved because it is a little bit slow."
"The proxy review, the use report views, the current use tool and the subset requests need some improvement. It was hard to understand how to use them."
"The solution's false positive analysis and vulnerability analysis libraries could be improved."
"They don't really provide the proof of concept up to the level that we need in our organization. We are a consultancy firm, and we provide consultancy for the implementation and deployment solutions to our customers. When you run the scans and the scan is completed, it only shows the proof of exploit, which really doesn't work because the tool is running the scan and exploiting on the read-only form. You don't really know whether it is actually giving the proof of exploit. We cannot prove it manually to a customer that the exploit is genuine. It is really hard to perform it manually and prove it to the concerned development, remediation, and security teams. It is currently missing the static application security part of the application security, especially web application security. It would be really cool if they can integrate a SAS tool with their dynamic one."
"The support's response time could be faster since we are in different time zones."
"Netsparker doesn't provide the source code of the static application security testing."
"Having support from senior management is crucial in making it mandatory for teams to collaborate with the security team throughout the development process."
Invicti is ranked 20th in Application Security Tools with 25 reviews while ShiftLeft is ranked 26th in Application Security Tools with 1 review. Invicti is rated 8.2, while ShiftLeft is rated 10.0. The top reviewer of Invicti writes "A customizable security testing solution with good tech support, but the price could be better". On the other hand, the top reviewer of ShiftLeft writes "Effectively in identify and fix bugs early in the development lifecycle". Invicti is most compared with OWASP Zap, Acunetix, PortSwigger Burp Suite Professional, Tenable.io Web Application Scanning and Fortify WebInspect, whereas ShiftLeft is most compared with SonarQube, Black Duck and Semgrep Supply Chain.
See our list of best Application Security Tools vendors and best Application Security Testing (AST) vendors.
We monitor all Application Security Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.