Skip to content
Home DAST Tools Intruder
Intruder

Intruder

Category: DAST
License: Commercial
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated February 7, 2026
3 min read
0 Comments

Intruder is a cloud-based continuous vulnerability scanner that monitors your external attack surface for security weaknesses. It runs 140,000+ checks against web applications, APIs, cloud infrastructure, and network services.

Intruder consolidated vulnerability management dashboard showing scan results and prioritization

Founded in 2015 and selected for the GCHQ Cyber Accelerator, Intruder now serves 3,000+ customers. It has a 4.8/5 rating on G2 from 154 reviews.

FeatureDetails
DeploymentCloud-only SaaS
Security checks140,000+
Cloud connectorsAWS, Azure, GCP
AI analystGregAI
ComplianceSOC 2, ISO 27001, PCI DSS, HIPAA, DORA
Integrations15+ (Jira, Slack, GitHub, etc.)
API accessPro, Premium, and Vanguard plans
Free trial14 days (Cloud plan features)
Starting priceSee intruder.io/pricing

What is Intruder?

Intruder scans internet-facing systems for vulnerabilities on a continuous basis. When your infrastructure changes or a new threat emerges, it triggers scans automatically. No manual scheduling required.

The platform differs from traditional DAST tools in scope. Where most DAST scanners focus on web application logic (XSS, SQLi, authentication flaws), Intruder covers the broader attack surface: exposed ports, misconfigured services, outdated software, and cloud misconfigurations alongside web application vulnerabilities.

Scope Difference
Intruder is an attack surface management platform with vulnerability scanning, not a deep application security tester. It finds exposed services and known CVEs across your entire perimeter. For detailed web app testing of authenticated flows and business logic, pair it with a dedicated DAST scanner like ZAP or Burp Suite.

Key Features

Attack Surface Monitoring
Automatically discovers new subdomains, exposed services, and cloud resources. Scans trigger when changes are detected so new assets get tested before attackers find them.
GregAI Analyst
Intruder’s AI security analyst. It verifies findings, suppresses false positives, and ranks what to fix first based on exploitability and whether the CVE is actively being used in the wild.
Cloud Security (CSPM)
Native connectors for AWS, Azure, and GCP. Runs daily misconfiguration checks and automatically imports cloud assets. Up to 3 accounts on Cloud plan, 10 on Pro, unlimited on Enterprise.
Emerging Threat Scans
When a new high-profile vulnerability drops, Intruder proactively checks your infrastructure. No waiting for scheduled scans when a critical CVE is published.
Compliance Reporting
Generates reports for SOC 2, ISO 27001, PCI DSS, HIPAA, and DORA. Keeps a history of vulnerability trends you can hand to auditors.
Risk Prioritization
Scoring factors in exploitability, asset criticality, and active exploitation data. Helps you ignore the noise and fix what actually matters.

Pricing

Intruder offers four tiers, all with 5 infrastructure licenses included:

  • Essential — 1 scheduled scan, unlimited ad hoc scans, enhanced risk data, unlimited users
  • Cloud — Unlimited scheduled scans, emerging threat scans, GregAI analyst, up to 3 cloud accounts, advanced analytics, role-based access, 15+ integrations
  • Pro — Internal target scanning, up to 10 cloud accounts, mass deployment options
  • Enterprise — Unlimited cloud accounts, 1000+ checks, attack surface visibility, advanced access control

Pricing is based on a base fee plus a per-target fee, calculated dynamically on Intruder’s pricing page.

All plans include a 14-day free trial with Cloud plan features.

Best Value
The Cloud plan is Intruder’s most popular tier. It includes unlimited scheduled scans, the GregAI analyst, and cloud security — none of which are in the Essential plan.

Integrations

Cloud Providers
AWS AWS
Azure Azure
Google Cloud Google Cloud
DevOps & Communication
GitHub GitHub
GitLab GitLab
Azure DevOps Azure DevOps
CircleCI CircleCI
Slack Slack
Microsoft Teams Microsoft Teams
Jira Jira
PagerDuty PagerDuty
Identity & Security
Okta Okta
Auth0 Auth0
Cloudflare Cloudflare

Getting Started

1
Create an account — Sign up at portal.intruder.io for a 14-day free trial. No installation needed; everything runs in the cloud.
2
Add targets — Specify domains, IP addresses, or connect AWS/Azure/GCP accounts. Cloud connectors auto-import your assets.
3
Run your first scan — Trigger manually or let Intruder scan automatically when it detects infrastructure changes.
4
Review and prioritize — GregAI filters noise and ranks findings by risk. Export reports for compliance or push issues to Jira/Slack.

API Access

The Intruder API lets you manage targets, trigger scans, and retrieve results programmatically. Available on Pro, Premium, and Vanguard plans.

# Trigger a scan via the Intruder API
curl -X POST "https://api.intruder.io/v1/scans" \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{"target_id": "target_123", "scan_profile": "comprehensive"}'

When to Use Intruder

Intruder works well for small to mid-sized organizations that need continuous attack surface monitoring without a dedicated security team. The cloud connectors and automated scanning mean less manual work for teams with cloud-native infrastructure.

It covers the gap between traditional vulnerability management (Qualys, Nessus) and application-specific DAST tools. If your primary concern is “what’s exposed on the internet and is it vulnerable,” Intruder answers that question.

For deep web application security testing of complex SPAs, authenticated workflows, or API business logic, you will need a complementary tool. Intruder itself acknowledges this positioning: it scans your perimeter, not the inner workings of your applications.

Frequently Asked Questions

What is Intruder and what does it scan?
Intruder is a cloud-based continuous vulnerability scanner that tests web applications, APIs, cloud infrastructure, and network services. It runs 140,000+ security checks against your external attack surface and alerts you when new vulnerabilities appear or infrastructure changes.
How much does Intruder cost?
Intruder has four tiers: Essential (1 scheduled scan, unlimited ad hoc), Cloud (unlimited scheduled scans, cloud security, GregAI), Pro (internal scanning, up to 10 cloud accounts), and Enterprise with custom pricing. Pricing is calculated based on the number of infrastructure and application licenses. All plans include a 14-day free trial.
What is GregAI in Intruder?
GregAI is Intruder’s AI security analyst that automates vulnerability assessment and response. It helps prioritize findings based on context, reduces alert noise, and provides actionable remediation guidance so teams can focus on the issues that matter most.
How does Intruder compare to traditional DAST tools?
Intruder focuses on continuous external attack surface monitoring rather than deep application-level testing. It excels at finding exposed services, misconfigurations, and known vulnerabilities across infrastructure. For thorough web application testing of complex SPAs, pair Intruder with a dedicated DAST tool.
What cloud platforms does Intruder integrate with?
Intruder has native connectors for AWS, Azure, and Google Cloud Platform. These automatically import your cloud assets and run daily misconfiguration checks. The platform also integrates with Jira, Slack, Microsoft Teams, GitHub, GitLab, Azure DevOps, CircleCI, PagerDuty, and Okta.

Complement with IAST

Pair dynamic testing with runtime instrumentation for broader coverage.

See all IAST tools

Comments

Powered by Giscus — comments are stored in GitHub Discussions.