Introducing G2.ai, the future of software buying.Try now

Top Free Breach and Attack Simulation (BAS) Software

Check out our list of free Breach and Attack Simulation (BAS) Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Breach and Attack Simulation (BAS) Software to ensure you get the right product.

View Free Breach and Attack Simulation (BAS) Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
6 Breach and Attack Simulation (BAS) Products Available
(191)4.6 out of 5
4th Easiest To Use in Breach and Attack Simulation (BAS) software
View top Consulting Services for vPenTest
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vonahi Security is building the future of offensive cybersecurity by delivering automated, high-quality penetration testing through its SaaS platform, vPenTest. Designed to replicate the tools, techni

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 74% Small-Business
    • 24% Mid-Market
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Logistics and Supply Chain
    AL
    My 3 favorite features of Vonahi are the detailed deliverables that can be further investigated, very specific control over scanned IPs, and the... Read review
    Tom L.
    TL
    vPenTest by Vonahi has been a great asset to my organization. It was so easy to get off the ground, easy to use and automate, and the knowledge it... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,275 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Vonahi Security is building the future of offensive cybersecurity by delivering automated, high-quality penetration testing through its SaaS platform, vPenTest. Designed to replicate the tools, techni

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 74% Small-Business
  • 24% Mid-Market
Verified User in Logistics and Supply Chain
AL
My 3 favorite features of Vonahi are the detailed deliverables that can be further investigated, very specific control over scanned IPs, and the... Read review
Tom L.
TL
vPenTest by Vonahi has been a great asset to my organization. It was so easy to get off the ground, easy to use and automate, and the knowledge it... Read review
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,550 Twitter followers
LinkedIn® Page
www.linkedin.com
5,275 employees on LinkedIn®
(57)4.7 out of 5
3rd Easiest To Use in Breach and Attack Simulation (BAS) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Small-Business
    • 35% Mid-Market
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ryan J.
    RJ
    Defendify explains each part of the security process. You don't need expertise. They will guide you in best practices and provide templates for... Read review
    Verified User in Marketing and Advertising
    AM
    Defendify has a full suite of Cybersecurity products that are easy to manage and cover a range of IT needs. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Defendify
    Year Founded
    2017
    HQ Location
    Portland, Maine
    Twitter
    @defendify
    312 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Small-Business
  • 35% Mid-Market
Ryan J.
RJ
Defendify explains each part of the security process. You don't need expertise. They will guide you in best practices and provide templates for... Read review
Verified User in Marketing and Advertising
AM
Defendify has a full suite of Cybersecurity products that are easy to manage and cover a range of IT needs. Read review
Seller Details
Seller
Defendify
Year Founded
2017
HQ Location
Portland, Maine
Twitter
@defendify
312 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(18)4.8 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Picus Security is a sophisticated Security Validation and Exposure Management Platform designed to assist organizations in continuously assessing, prioritizing, and mitigating cyber risks. By simulati

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 56% Enterprise
    • 22% Mid-Market
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • LZ
    Actionable Remediation – After simulating attacks, it provides concrete suggestions, like missing detection rules or specific signature updates,... Read review
    FV
    Picus regularly updates its threat library with techniques mapped to MITRE ATT&CK, helping my organizations test defenses against the latest... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    N/A
    Twitter
    @PicusSecurity
    2,811 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    227 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Picus Security is a sophisticated Security Validation and Exposure Management Platform designed to assist organizations in continuously assessing, prioritizing, and mitigating cyber risks. By simulati

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 56% Enterprise
  • 22% Mid-Market
LZ
Actionable Remediation – After simulating attacks, it provides concrete suggestions, like missing detection rules or specific signature updates,... Read review
FV
Picus regularly updates its threat library with techniques mapped to MITRE ATT&CK, helping my organizations test defenses against the latest... Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
N/A
Twitter
@PicusSecurity
2,811 Twitter followers
LinkedIn® Page
www.linkedin.com
227 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 35% Enterprise
    • 35% Small-Business
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • ADESH J.
    AJ
    I would like to inform you that, I used IBM Randori Recon install and configure in linux server over nagios monitoring tool, its very easy to use... Read review
    Parth S.
    PS
    I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Waltham, Massachusetts
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 35% Enterprise
  • 35% Small-Business
ADESH J.
AJ
I would like to inform you that, I used IBM Randori Recon install and configure in linux server over nagios monitoring tool, its very easy to use... Read review
Parth S.
PS
I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use... Read review
Seller Details
Year Founded
2018
HQ Location
Waltham, Massachusetts
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FourCore ATTACK provides a comprehensive view of security effectiveness by validating controls with realistic attacks. • Identify gaps in endpoint, email and network security controls before real att

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Sumukha B.
    SB
    It has amazing features, great UI dashboard and very much useful in assessing security and firewall ability to prevent threat atacks by launching... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    FourCore
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

FourCore ATTACK provides a comprehensive view of security effectiveness by validating controls with realistic attacks. • Identify gaps in endpoint, email and network security controls before real att

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Sumukha B.
SB
It has amazing features, great UI dashboard and very much useful in assessing security and firewall ability to prevent threat atacks by launching... Read review
Seller Details
Seller
FourCore
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Find the breach point before it finds you. Adopting a prevention first strategy requires thinking — and operating — like attackers. Continuously. Chariot is a unified vulnerability and threat expos

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @praetorianlabs
    8,283 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Find the breach point before it finds you. Adopting a prevention first strategy requires thinking — and operating — like attackers. Continuously. Chariot is a unified vulnerability and threat expos

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Twitter
@praetorianlabs
8,283 Twitter followers
LinkedIn® Page
www.linkedin.com