171 Intruder Reviews
I appreciate Intruder.io's user-friendly interface, which simplifies navigation and operation, making it accessible even for those with limited technical expertise. Additionally, its extensive vulnerability scanning capabilities provide comprehensive coverage, ensuring that potential security issues are thoroughly identified and addressed Review collected by and hosted on G2.com.
While Intruder.io offers a user-friendly interface and extensive coverage, generating reports for specific resources isn't intuitive. Additionally, updating targets requires deletion and re-adding, likely due to licensing constraints, necessitating reliance on external DNS configuration Review collected by and hosted on G2.com.
Intruder is an incredibly easy-to-use security scanning service that automatically and efficiently identifies vulnerabilities. It's a powerful tool that eliminates the stress of managing cybersecurity risks, making it ideal for both small teams and larger organizations. The intuitive interface, clear reports, and time-saving features make it a standout solution. On top of that, the pricing is very reasonable for the value it provides. Highly recommended for anyone seeking a hassle-free security solution.
Implementation is straightforward, even if your environment includes firewalls or authentication systems. You can simply add exclusions, which are conveniently provided during the configuration process. We run scans on a weekly basis, benefiting from the automated scanning features (every month), while also conducting manual scans whenever we release something new to ensure security remains airtight.
The customer support is outstanding — responsive, efficient, and highly helpful. Additionally, integrating Intruder with our platform was very easy. Review collected by and hosted on G2.com.
We've been using Intruder for years, and right now there's nothing we dislike about it. Review collected by and hosted on G2.com.

We have a large task ahead, with changes in PCI 4.0 requiring that even sites which do not process card details directly require a level of compliance. We needed a partner who could perform compliant scans and would give our developers clear guidance on how to mitigate any issues it found. We tried out a couple of services, but Intruder came out tops, with a simple interface, easy to understand reports, plus the benefit of constant emergent threat scanning. This gives us the confidence that our web applications will remain as secure as possible in the long term. The pricing is competitive and easy to understand, plus the discounts start to kick in when scanning more than one application which will greatly reduce our costs as we manage about 35 websites which now have this requirement.
I had a few questions along the way which were promptly responded to with really good advice. Review collected by and hosted on G2.com.
It scans for literally everything and the scans take a very long time to complete. It would be great to be able to filter the scans to look for specific issues, rather than completing a whole scan each time. Review collected by and hosted on G2.com.
It was easy to use and made it simple to generate professional-looking reports. As a small team, having an automated tool that could quickly give us, and our clients, peace of mind was really valuable. We’re currently on the “Essentials” plan, so I can’t speak to the more advanced features, but the overall experience has been excellent.
I did run into a small issue when setting up scanning targets, but the customer support team were quick to respond and had it sorted within a few hours. Really impressed with the support and how smooth everything’s been so far. Review collected by and hosted on G2.com.
The costs are a bit higher than we anticipated. Review collected by and hosted on G2.com.

Intruder makes vulnerability management easy and fast. Its intuitive interface, seamless integration, and proactive threat detection simplify our cybersecurity operations significantly. Review collected by and hosted on G2.com.
Occasionally, the detailed reports can be overwhelming for beginners, but overall, there's very little to dislike. Review collected by and hosted on G2.com.
I like the functionality they have provided for a quick vulnerability scan on infrastructure or applications. Additionally the support provided by Joe was quick and precises. Review collected by and hosted on G2.com.
Probably the licensing approach to targets Review collected by and hosted on G2.com.
I liked that for auth, you can record using Chrome dev tools, upload a swagger file, & use multiple auth methods. And a quick response from the support team when I needed to change the domain. Review collected by and hosted on G2.com.
I dislike the system where you have to wait for a month to change domains. Luckily the support team could help me out. Review collected by and hosted on G2.com.
I use many products day to day some of which are very time consuming and difficult to navigate, this product is my favourite by far, it's easy to use which makes me want to use it more and more, I also had to perform quite a technical task linking this product to another, I was sent instructions for this, they were so easy to follow that I managed to not only setup this up correctly but also very quickly, this has given my confidence a huge boost and made me want to learn more, thank you for making work life easier! Review collected by and hosted on G2.com.
There is nothing so far that I dislike, evetything has been very easy and helpful. Review collected by and hosted on G2.com.
Intruder is very intuative and simple to use. The scans are easy to set up on many different assets both local and cloud based. Review collected by and hosted on G2.com.
The reporting and customization is limited. I had to do some editing to get branded reports. Review collected by and hosted on G2.com.