
Wapiti is a free Dynamic Application Security Testing tool. Security professionals most commonly compare it with VulnSign Dynamic Application Security Testing, . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Wapiti, including their key features and shared capabilities.
DAST tool for scanning web apps, microservices, and APIs for vulnerabilities
Shares 3 capabilities with Wapiti: SQL Injection, Web Security, XSS
DAST tool for detecting web app vulnerabilities like SQL injection and XSS
Shares 3 capabilities with Wapiti: SQL Injection, Web Security, XSS
DAST scanner for web apps & APIs with automated vuln detection & remediation
Shares 3 capabilities with Wapiti: SQL Injection, Web Security, XSS
w3af is an open source web application security scanner that identifies over 200 types of vulnerabilities including XSS, SQL injection, and OS commanding in web applications.
Shares 3 capabilities with Wapiti: SQL Injection, Web Security, XSS
A Java based HTTP/HTTPS proxy for assessing web application vulnerability with various useful features.
Shares 3 capabilities with Wapiti: SQL Injection, Web Security, XSS
A web security tool that scans for vulnerabilities and known attacks.
Shares 3 capabilities with Wapiti: SQL Injection, Web Security, XSS
DAST scanner for Single Page Applications using headless browser technology
DAST tool for scanning web apps and APIs for OWASP Top 10 vulnerabilities
DAST tool for scanning web apps, microservices, and APIs for vulnerabilities
DAST tool for detecting web app vulnerabilities like SQL injection and XSS
DAST scanner for web apps & APIs with automated vuln detection & remediation
w3af is an open source web application security scanner that identifies over 200 types of vulnerabilities including XSS, SQL injection, and OS commanding in web applications.
A Java based HTTP/HTTPS proxy for assessing web application vulnerability with various useful features.
A web security tool that scans for vulnerabilities and known attacks.
DAST scanner for Single Page Applications using headless browser technology
DAST tool for scanning web apps and APIs for OWASP Top 10 vulnerabilities
A tool to find XSS vulnerabilities in web applications
A Burp Suite plugin for automatically adding XSS and SQL payload to fuzz
Managed web app security scanning service covering OWASP Top 10 vulnerabilities
AI-enhanced web app vulnerability scanner with zero false-positive SLA
DAST platform for web app & API vulnerability scanning with AI-enabled features
Cloud-based DAST solution for web app & API security with AI-powered scanning
An enterprise-scale dynamic application security testing (DAST) platform that provides automated vulnerability scanning and security assessment for web applications.
DAST tool for automated web app and API vulnerability scanning and testing
Enterprise DAST solution for runtime app and API security testing
DAST scanner that identifies web app vulnerabilities and attack surfaces
Runtime application security library blocking zero-days & OWASP Top 10 attacks
Dynamic application security testing tool for runtime vulnerability detection
DAST tool that scans live web apps to detect vulnerabilities in real-time
DAST tool for continuous automated security testing of web and mobile apps
DAST scanner with proof-based vulnerability validation and CI/CD integration
DAST scanner for APIs and web apps with AI-powered testing and low FP rate
Web app vulnerability scanner with continuous scanning and authenticated testing
Web application vulnerability scanner with automated authentication support
DAST tool for automated web app and API vulnerability scanning
DAST scanner for web apps and APIs with OWASP Top 10 vulnerability detection
Full-stack web app security testing platform with SAST, DAST, SCA, and pentesting
Managed application security testing service for web applications
DAST solution for mobile and web app security testing and vulnerability scanning
Automated DAST tool for continuous web app and API vulnerability scanning.
Dynamic web app & API vulnerability scanner with free and paid tiers.
DAST scanner for web apps & APIs with CI/CD integration & 15k+ test cases.
Web app security platform for vulnerability scanning & secure dev.
DAST platform for scanning web apps & APIs within CI/CD pipelines.
DAST scanner for discovering and testing APIs and web apps for vulns.
CI/CD-integrated DAST tool for automated web app and API vuln scanning.
DAST solution for web apps and APIs with automated scanning capabilities
Akamai Client-Side Protection & Compliance is a security tool that monitors and protects against client-side threats on websites, aiding in PCI DSS v4.0 compliance.
Jaeles is an automated web application testing tool that helps identify vulnerabilities and security issues through customizable testing scenarios.
A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.
CakeFuzzer is an automated vulnerability discovery tool specifically designed for identifying security issues in CakePHP web applications with minimal false positives.
A collection of Yara rules for the Burp Yara-Scanner extension that helps identify malicious software and infected web pages during web application security assessments.
DOMPurify is a fast XSS sanitizer for HTML, MathML, and SVG.
IronBee is an open source web application security sensor framework that provides detection and prevention capabilities for web application vulnerabilities.
ZAP is an open-source web application security scanner that helps identify vulnerabilities through automated scanning and manual testing capabilities.
Common questions security professionals ask when evaluating alternatives and competitors to Wapiti.
The most popular alternatives to Wapiti include VulnSign Dynamic Application Security Testing, Halo Security Application Scanning, Acunetix Web Application & API Security, w3af, and Paros. These Dynamic Application Security Testing tools offer similar capabilities and are frequently compared by security professionals evaluating their options.