Intruder vs. Nikto

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Intruder
Score 8.7 out of 10
N/A
Intruder, from Intruder Systems in London, is a cloud-based vulnerability scanner that finds cyber security weaknesses in digital infrastructure, to avoid costly data breaches.
$127
per month 1 infrastructure target
Nikto
Score 10.0 out of 10
N/A
Nikto is an open source fast (not stealthy) vulnerability testing tool that can be used in penetration testing or purple team exercises.N/A
Pricing
IntruderNikto
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
IntruderNikto
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
IntruderNikto
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Best Alternatives
IntruderNikto
Small Businesses
ThreatDown, powered by Malwarebytes
ThreatDown, powered by Malwarebytes
Score 8.7 out of 10

No answers on this topic

Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Veracode
Veracode
Score 8.5 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Veracode
Veracode
Score 8.5 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
IntruderNikto
Likelihood to Recommend
9.0
(1 ratings)
10.0
(1 ratings)
User Testimonials
IntruderNikto
Likelihood to Recommend
Intruder Systems
When the infrastructure landscape and risk profile is not well known and is legacy, Intruder can scan and automate reporting on open security risks, as well as coordinate responses.
Read full review
Open Source
Nikto is well suited for scanning web server-related vulnerabilities for small and medium enterprises. We can utilise it for checking server default files and security misconfigurations. It is not suited well for some users because it is CLI based tool and not a GUI based. Also, community and OEM support are not available for this tool.
Read full review
Pros
Intruder Systems
  • Auto scanning.
  • New vulnerability detection.
  • Alert levels.
Read full review
Open Source
  • Well known tool
  • Source code available
  • Wweb server vulnerability scanner
Read full review
Cons
Intruder Systems
  • Reports could contain more detail.
Read full review
Open Source
  • Can be made GUI based for ease of users
  • User community should be there
  • Development and support should be available
Read full review
Alternatives Considered
Intruder Systems
Intruder focuses on scanning network blocks for your servers even if you don't know which services or hostnames are running on them, unlike Detectify which requires a domain or hostname to scan. The network port scanning of Intruder is also broader than many competitors.
Read full review
Open Source
No answers on this topic
Return on Investment
Intruder Systems
  • Improved security profile.
  • Better reporting to stakeholders and clients of the current security risks.
Read full review
Open Source
  • Improved security posture of organisation.
  • Improved in regulatory and corporate compliance.
  • Easy to use result in adaptation of this tool by business users.
Read full review
ScreenShots

Intruder Screenshots

Screenshot of The Intruder dashboardScreenshot of Cloud connectorsScreenshot of Network viewScreenshot of Issues pageScreenshot of Targets page