(183)
4.8 out of 5
Visit Website
Sponsored
API / Integrations | Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 14 Burp Suite reviews. | 85% (Based on 14 reviews) | |
Extensibility | Provides the ability to extend the platform to include additional features and functionalities 16 reviewers of Burp Suite have provided feedback on this feature. | 90% (Based on 16 reviews) | |
Reporting and Analytics | Tools to visualize and analyze data. 15 reviewers of Burp Suite have provided feedback on this feature. | 90% (Based on 15 reviews) | |
API / Integrations | Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data | |
Extensibility | Provides the ability to extend the platform to include additional features and functionalities | Not enough data |
Issue Tracking | As reported in 12 Burp Suite reviews. Track issues and manage resolutions. | 83% (Based on 12 reviews) | |
Reconnaissance | As reported in 18 Burp Suite reviews. Gathers information about the system and potential exploits to be tested. | 93% (Based on 18 reviews) | |
Vulnerability Scan | Scans applications and networks for known vulnerabilities, holes and exploits. 18 reviewers of Burp Suite have provided feedback on this feature. | 90% (Based on 18 reviews) | |
Reporting and Analytics | Tools to visualize and analyze data. | Not enough data | |
Issue Tracking | Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. | Not enough data | |
Static Code Analysis | Examines application source code for security flaws without executing it. | Not enough data | |
Vulnerability Scan | Scans applications and networks for known vulnerabilities, holes and exploits. | Not enough data | |
Code Analysis | Scans application source code for security flaws without executing it. | Not enough data |
Command-Line Tools | Allows users to access a terminal host system and input command sequences. This feature was mentioned in 11 Burp Suite reviews. | 74% (Based on 11 reviews) | |
Manual Testing | Based on 18 Burp Suite reviews. Allows users to perfrom hands-on live simulations and penetration tests. | 94% (Based on 18 reviews) | |
Test Automation | As reported in 17 Burp Suite reviews. Runs pre-scripted security tests without requiring manual work. | 82% (Based on 17 reviews) | |
Performance and Reliability | Software is consistently available (uptime) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took. 18 reviewers of Burp Suite have provided feedback on this feature. | 86% (Based on 18 reviews) | |
Manual Testing | Allows users to perfrom hands-on live simulations and penetration tests. | Not enough data | |
Test Automation | Runs pre-scripted security tests without requiring manual work. | Not enough data | |
Compliance Testing | Allows users to test applications for specific compliance requirements. | Not enough data | |
Black-Box Scanning | Scans functional applications externally for vulnerabilities like SQL injection or XSS. | Not enough data | |
Detection Rate | The rate at which scans accurately detect all vulnerabilities associated with the target. | Not enough data | |
False Positives | The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. | Not enough data |
Issue Tracking | Based on 62 Burp Suite reviews and verified by the G2 Product R&D team. Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. | 90% (Based on 62 reviews) | |
Detection Rate | Based on 64 Burp Suite reviews and verified by the G2 Product R&D team. The rate at which scans accurately detect all vulnerabilities associated with the target. | 87% (Based on 64 reviews) | |
False Positives | Based on 64 Burp Suite reviews and verified by the G2 Product R&D team. The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. | 72% (Based on 64 reviews) | |
Automated Scans | Runs pre-scripted vulnerability scans without requiring manual work. 63 reviewers of Burp Suite have provided feedback on this feature. | 87% (Based on 63 reviews) |
Compliance Testing | Based on 54 Burp Suite reviews and verified by the G2 Product R&D team. Allows users to scan applications and networks for specific compliance requirements. | 80% (Based on 54 reviews) | |
Perimeter Scanning | Based on 53 Burp Suite reviews and verified by the G2 Product R&D team. Analyzes network devices, servers and operating systems for vulnerabilities. | 83% (Based on 53 reviews) | |
Configuration Monitoring | Based on 54 Burp Suite reviews and verified by the G2 Product R&D team. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | 80% (Based on 54 reviews) |
Manual Application Testing | Based on 66 Burp Suite reviews and verified by the G2 Product R&D team. Allows users to perfrom hands-on live simulations and penetration tests. | 93% (Based on 66 reviews) | |
Static Code Analysis | As reported in 56 Burp Suite reviews. Scans application source code for security flaws without executing it. | 79% (Based on 56 reviews) | |
Black Box Testing | Based on 63 Burp Suite reviews and verified by the G2 Product R&D team. Scans functional applications externally for vulnerabilities like SQL injection or XSS. | 90% (Based on 63 reviews) |
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data |