Invicti offers advanced web application security testing focused on identifying vulnerabilities like SQL injection and cross-site scripting. Its Proof-Based Scanning minimizes false positives and integrates seamlessly with CI/CD pipelines, making it an effective tool for enterprise environments.



| Product | Mindshare (%) |
|---|---|
| Invicti | 8.8% |
| Veracode | 16.6% |
| Checkmarx One | 15.3% |
| Other | 59.3% |
| Type | Title | Date | |
|---|---|---|---|
| Category | Dynamic Application Security Testing (DAST) | Apr 29, 2026 | Download |
| Product | Reviews, tips, and advice from real users | Apr 29, 2026 | Download |
| Comparison | Invicti vs Veracode | Apr 29, 2026 | Download |
| Comparison | Invicti vs Checkmarx One | Apr 29, 2026 | Download |
| Comparison | Invicti vs OpenText Dynamic Application Security Testing | Apr 29, 2026 | Download |
| Title | Rating | Mindshare | Recommending | |
|---|---|---|---|---|
| SonarQube | 4.0 | N/A | 84% | 136 interviewsAdd to research |
| Snyk | 4.1 | N/A | 100% | 51 interviewsAdd to research |
| Company Size | Count |
|---|---|
| Small Business | 11 |
| Midsize Enterprise | 3 |
| Large Enterprise | 12 |
| Company Size | Count |
|---|---|
| Small Business | 135 |
| Midsize Enterprise | 78 |
| Large Enterprise | 191 |
Invicti provides comprehensive scanning capabilities that include detecting and verifying critical vulnerabilities and security data consolidation. Its scalable scanning engine and robust API support allow for flexible testing across diverse environments, including web and API testing. Despite some drawbacks like limited single sign-on integration and slow scanning speeds for large applications, Invicti remains a popular choice for automating security assessments, ensuring compliance with standards like OWASP Top 10, PCI DSS, and GDPR.
What are the key features of Invicti?In industries like finance, healthcare, and e-commerce, Invicti is implemented to bolster security through automated vulnerability assessments. Its ability to provide insightful reports and remediation suggestions assists companies in efficiently managing security risks and achieving compliance with critical regulatory standards.
Invicti was previously known as Netsparker.
Samsung, The Walt Disney Company, T-Systems, ING Bank
| Author info | Rating | Review Summary |
|---|---|---|
| Senior Manager, Security Engineering at ESS | 4.0 | I've used Invicti for over three years for web and API testing; it's reliable in identifying vulnerabilities, though scan performance needs improvement. Setup is easy, support is good, and it's well-suited to our SSDLC and technology stack. |
| Solution Architect at a tech services company with 51-200 employees | 4.0 | I've used Invicti for three years to secure web applications; it’s easy to deploy, scalable, and offers effective SAST and DAST scanning, with solid vulnerability detection and good support, especially for SMBs in hybrid environments. |
| Capability Center Leader, ETRM Platforms at Shell | 4.0 | I use Invicti for code scans to identify vulnerabilities and secrets, aiding our development teams in prioritizing tasks. Its proactive scanning is valuable, though its reporting needs improvement for enterprise-level insights. Invicti was my first such tool. |
| Cyber Security Engineer at Spartec | 5.0 | I primarily use Netsparker for website scanning, appreciating its interactive interface and scalability for securing large-scale applications. Previously, I used Tenable.io but found Netsparker more engaging. There's currently nothing I wish to improve about it. |
| CEO at Xcelliti | 3.5 | We use Invicti for vulnerability testing, especially in fintech. It excels in proof-based scanning with minimal false positives, integrates well with CI/CD pipelines, and offers good scalability. However, improvements are needed in user interface, documentation, and support. |
| Senior Manager, Security Engineering at ESS | 4.0 | I use Invicti primarily for web application and API testing. I find its API testing and false positive checks valuable, though improvements in scanning time and authentication features are needed. I also use Burp Suite and HCL AppScan for specific tasks. |
| Senior Information Security Analyst at EastNets Holding Ltd. | 4.5 | We use Invicti to initialize applications before client release, deploying and scanning for specific server issues, language, and vulnerabilities. Its strengths are confirming access and SSL injection vulnerabilities and connecting with other security tools. However, report specificity needs improvement. |
| Presales Consultant at Cyberwise | 4.0 | We use Invicti to detect vulnerabilities and ensure compliance with regulations like PCI DSS and GDPR. Its proof-based scanning reduces false positives and saves time. However, the costly licensing, lengthy scan times, and need for more integrations are drawbacks. |