Hydra vs. Intruder

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Hydra
Score 9.0 out of 10
N/A
Hydra is a password cracking tool used for penetration testing.N/A
Intruder
Score 8.7 out of 10
N/A
Intruder, from Intruder Systems in London, is a cloud-based vulnerability scanner that finds cyber security weaknesses in digital infrastructure, to avoid costly data breaches.
$127
per month 1 infrastructure target
Pricing
HydraIntruder
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
HydraIntruder
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
HydraIntruder
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Best Alternatives
HydraIntruder
Small Businesses

No answers on this topic

ThreatDown, powered by Malwarebytes
ThreatDown, powered by Malwarebytes
Score 8.8 out of 10
Medium-sized Companies
Veracode
Veracode
Score 8.4 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
Veracode
Veracode
Score 8.4 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
HydraIntruder
Likelihood to Recommend
9.0
(1 ratings)
9.0
(1 ratings)
User Testimonials
HydraIntruder
Likelihood to Recommend
Open Source
One scenario that fits well Hydra's ability is to test the strength of Drupal usernames and passwords. So, as an example, if we have a Drupal site at some HTTP web address, we could use lots of methods in order to collect a list with some valid users. After we create the list and also the list of some possible passwords we can try to initiate a Hydra brute force attack. Hydra for example is not suited for finding the vulnerabilities of a host, for this other solutions can be used.
Read full review
Intruder Systems
When the infrastructure landscape and risk profile is not well known and is legacy, Intruder can scan and automate reporting on open security risks, as well as coordinate responses.
Read full review
Pros
Open Source
  • One of most important thing is that Hydra's ability to perform HTTP post form attacks.
  • The tool also can be used to attack a great number of protocols.
  • The source code of the tool/software is also available for others (so it is not a closed source one).
  • A good thing about this tool is also the support available and it also has a high ranking on GitHub (over 1000 stars).
Read full review
Intruder Systems
  • Auto scanning.
  • New vulnerability detection.
  • Alert levels.
Read full review
Cons
Open Source
  • It is not a straightforward tool to use, it needs certain dependencies to be installed so it can function as intended by its creators. This is one of the most important steps that need to be done while configuring the tool as one needs.
  • Sometimes the tool gives False Positives passwords.
  • There are some issues in the functionality of the tool itself (like some bugs, for example affecting the running and hanging process after a number of tries), but most of them have a solution and there is big community support for the tool.
Read full review
Intruder Systems
  • Reports could contain more detail.
Read full review
Alternatives Considered
Open Source
There are many other tools similar to Hydra, one of them being "John the Ripper ". Notable differences are that while John the Ripper works offline, Hydra works online; also Hydra is more popular and with a wider usage as it supports Windows, Linux, and macOSX. An important thing is that both software are free to use, making both very useful tools. We can note that JTR has also a "pro" version that is not free to use and it is more optimized for speed and performance and focused on a specific operating system, while Hydra is free and offers all features at no cost.
Read full review
Intruder Systems
Intruder focuses on scanning network blocks for your servers even if you don't know which services or hostnames are running on them, unlike Detectify which requires a domain or hostname to scan. The network port scanning of Intruder is also broader than many competitors.
Read full review
Return on Investment
Open Source
  • Our business objectives are accomplished using the tool as Hydra covers our needs for a free password cracking tool.
  • The tool is a free one that has a lot of advantages because it is a powerful one to use for the specific task of performing some activities that are related to penetration testing.
  • The services that our business provides for several clients in the field of penetration testing are at the level our customers are expecting.
Read full review
Intruder Systems
  • Improved security profile.
  • Better reporting to stakeholders and clients of the current security risks.
Read full review
ScreenShots

Intruder Screenshots

Screenshot of The Intruder dashboardScreenshot of Cloud connectorsScreenshot of Network viewScreenshot of Issues pageScreenshot of Targets page