Intruder vs. Mobile Security Framework (MobSF)

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Intruder
Score 9.0 out of 10
N/A
Intruder, from Intruder Systems in London, is a cloud-based vulnerability scanner that finds cyber security weaknesses in digital infrastructure, to avoid costly data breaches.
$127
per month 1 infrastructure target
Mobile Security Framework (MobSF)
Score 8.0 out of 10
N/A
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. MobSF support mobile app binaries (APK, IPA & APPX) along with zipped source code and provides REST APIs for integration with CI/CD or DevSecOps pipeline. The Dynamic Analyzer helps you to perform runtime security assessment and interactive instrumented testing.N/A
Pricing
IntruderMobile Security Framework (MobSF)
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
IntruderMobile Security Framework (MobSF)
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
IntruderMobile Security Framework (MobSF)
Best Alternatives
IntruderMobile Security Framework (MobSF)
Small Businesses
Action1
Action1
Score 9.5 out of 10

No answers on this topic

Medium-sized Companies
Action1
Action1
Score 9.5 out of 10
Veracode
Veracode
Score 9.2 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Veracode
Veracode
Score 9.2 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
IntruderMobile Security Framework (MobSF)
Likelihood to Recommend
9.0
(1 ratings)
8.0
(1 ratings)
User Testimonials
IntruderMobile Security Framework (MobSF)
Likelihood to Recommend
Intruder Systems
When the infrastructure landscape and risk profile is not well known and is legacy, Intruder can scan and automate reporting on open security risks, as well as coordinate responses.
Read full review
Open Source
MobSF is good for checking for vulnerabilities in your app. It will also give suggestions on how to address them. Another thing is can do is find code that may be incorrect. It is not, however, a substitute for a system that actually checks your code for proper use. It really is concentrated on security.
Read full review
Pros
Intruder Systems
  • Auto scanning.
  • New vulnerability detection.
  • Alert levels.
Read full review
Open Source
  • Scan for vulnerabilities
  • Scan for bad coding
  • Give suggestions on fixes for security issues
Read full review
Cons
Intruder Systems
  • Reports could contain more detail.
Read full review
Open Source
  • The UI is not that user friendly
  • The documentation could be easier to understand
  • An easier method of deploying MobSF would be appreciated
Read full review
Alternatives Considered
Intruder Systems
Intruder focuses on scanning network blocks for your servers even if you don't know which services or hostnames are running on them, unlike Detectify which requires a domain or hostname to scan. The network port scanning of Intruder is also broader than many competitors.
Read full review
Open Source
In my opinion, MobSF is not as comprehensive as SonarQube. Both, however, do a very good job in scanning your code for vulnerabilities. Both do roughly the same things. The reports of SonarQube are more detailed though. The advantage that MobSF has over SonarQube is the price. One is free while the other is a paid solution (with several tiers). However, we use them together to get a more comprehensive scan.
Read full review
Return on Investment
Intruder Systems
  • Improved security profile.
  • Better reporting to stakeholders and clients of the current security risks.
Read full review
Open Source
  • It has allowed our apps to pass a security vetting requirement of a third party to deploy our app
  • We can see where we can improve on the development of our app
  • The deployment can take a while, especially with teams not familiar with the software
Read full review
ScreenShots

Intruder Screenshots

Screenshot of The Intruder dashboardScreenshot of Cloud connectorsScreenshot of Network viewScreenshot of Issues pageScreenshot of Targets page