
Top picks: Burp Suite Professional, xsshunter_client, MITM SOCKS Proxy for Java — plus 45 more compared.
Vulnerability ManagementPETEP (PEnetration TEsting Proxy) is a free tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to PETEP (PEnetration TEsting Proxy), including their key features and shared capabilities.
A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.
A correlated injection proxy tool that integrates with XSS Hunter for automated cross-site scripting vulnerability testing and payload tracking.
Intercepts and examines mobile app connections by stripping SSL/TLS layer.
A penetration testing tool that intercepts SSH connections by patching OpenSSH source code to act as a proxy and log plaintext passwords and sessions.
mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.
A WebSocket Manipulation Proxy with a user interface to capture, intercept, and send custom messages for WebSocket and Socket.IO communications.
Lambda-Proxy is a utility that enables SQL injection testing of AWS Lambda functions by converting SQLMap HTTP attacks into Lambda invoke calls through a local proxy.
SQLi-Hunter is an HTTP/HTTPS proxy server and SQLMAP API wrapper that simplifies the identification and exploitation of SQL injection vulnerabilities in web applications.
A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.
A correlated injection proxy tool that integrates with XSS Hunter for automated cross-site scripting vulnerability testing and payload tracking.
Intercepts and examines mobile app connections by stripping SSL/TLS layer.
A penetration testing tool that intercepts SSH connections by patching OpenSSH source code to act as a proxy and log plaintext passwords and sessions.
mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.
A WebSocket Manipulation Proxy with a user interface to capture, intercept, and send custom messages for WebSocket and Socket.IO communications.
Lambda-Proxy is a utility that enables SQL injection testing of AWS Lambda functions by converting SQLMap HTTP attacks into Lambda invoke calls through a local proxy.
SQLi-Hunter is an HTTP/HTTPS proxy server and SQLMAP API wrapper that simplifies the identification and exploitation of SQL injection vulnerabilities in web applications.
Shadow Workers is an open source C2 framework and proxy tool for penetration testers to exploit XSS vulnerabilities and malicious Service Workers.
A tool to easily automate and multithread your pentesting and bug bounty workflow without any coding
AI-powered autonomous penetration testing platform with multi-agent system
AI-powered automated penetration testing platform for vulnerability discovery
AI-powered automated penetration testing platform for web apps, APIs & GraphQL
Human-guided continuous pentesting platform with attack surface management
AI-powered automated pen testing & continuous red teaming platform
Pentest management platform for reporting, project mgmt & client collaboration
Pentest reporting & exposure mgmt platform for vulnerability remediation
Automated pentesting for web apps & APIs with continuous vulnerability scanning
Penetration testing software for simulating attacks and validating vulnerabilities
Automated internal network penetration testing and security validation platform
Continuous pentesting service monitoring web apps & APIs for code changes
AI-powered automated penetration testing platform for web apps and networks
AI-powered automated penetration testing platform for on-demand security audits
AI-powered autonomous pentesting platform for continuous security validation
Modular offensive security platform for continuous monitoring and testing
AI-native multi-agent pentesting engine for autonomous vulnerability discovery
AI-driven autonomous pentesting platform for continuous vulnerability discovery
Continuous automated pentesting platform for ongoing security assessment
Autonomous AI system for continuous penetration testing and exploit validation
Cloud-based penetration testing platform for threat mgmt & remediation
Managed continuous penetration testing service for internal & external networks
Autonomous penetration testing platform identifying attack paths & vulnerabilities
Automated network penetration testing tool for internal and external attacks
Continuous pentesting platform with autonomous AI agents for web apps and APIs
AI-powered continuous pentesting platform with agentic automation
AI-powered pentest & VMDR platform for vulnerability scanning & management
AI-driven pentesting platform with white hat hacker community support
Autonomous pentesting platform for internal, external, cloud & K8s testing
Autonomous pentesting platform for data exfiltration testing & validation
AI-powered autonomous vulnerability hunter with CLI and platform interfaces
Pentest engagement management platform with continuous testing & real-time reporting.
PTaaS platform for managing pentests, DAST, and attack surface monitoring.
Pen testing platform with guided automation and certified exploit library.
AI-powered continuous pentesting platform combining autonomous agents with human hackers.
Common questions security professionals ask when evaluating alternatives and competitors to PETEP (PEnetration TEsting Proxy).
The most popular alternatives to PETEP (PEnetration TEsting Proxy) include Burp Suite Professional, xsshunter_client, MITM SOCKS Proxy for Java, SSH MITM v2.3-dev, and mitmproxy. These Penetration Testing tools offer similar capabilities and are frequently compared by security professionals evaluating their options.