Skip to content
Invicti

Invicti

Category: DAST
License: Commercial

Invicti represents an enterprise-grade DAST platform that merges DAST, IAST, and SCA capabilities into one solution.

The tool scans websites and APIs for security vulnerabilities and has been adopted by over 3,100 companies globally.

It evolved from Netsparker, one of the industry’s most recognized dynamic analysis tools.

Invicti Enterprise Dashboard

Primary Use Cases

Vulnerability Detection

Invicti identifies web application security issues including SQL injection and cross-site scripting (XSS) attacks.

Security Issues Detection

Software Composition Analysis

Beyond vulnerability scanning, the platform catalogs technologies within web applications and monitors these libraries proactively.

Out of Date Technologies

DevSecOps Integration

Most organizations incorporate Invicti into their DevSecOps workflows.

SDLC Integration

Discovery Feature

The Discovery function activates automatically upon account creation, automatically identifying websites potentially associated with your organization through multiple data sources:

  • Business email domain matching
  • Out-of-scope links from scans
  • Websites hosted on identical IP addresses
  • SSL certificate organization names
  • Domain keyword and second-level domain analysis

Discovery Feature

Since automated discovery isn’t perfect, filtering capabilities help eliminate unrelated results.

Discovery Filter Options

Website Management

Adding Targets

You can add websites individually or import multiple targets via CSV.

Websites support membership across multiple groups for organizational flexibility based on:

  • Hosting infrastructure
  • Technology stack
  • Geographic location
  • Team assignment
  • Priority levels

Add a New Website

Website Groups

Group Scanning

Group assignments enable batch scanning operations across related targets.

Starting a Group Scan

Scan Configuration

Scan Profiles

Save and share scan configurations across team members.

Save a Scan Profile

Scan Policies

Pre-built Options

Select from standard policies including OWASP Top 10 or PCI compliance checks.

Built-in Scan Policies

Custom Policy Creation

Create a New Scan Policy

Security Checks Configuration

Customize which vulnerability types to scan, such as focusing exclusively on out-of-band SQL injection detection.

Security Checks in Scan Policy

Crawling Parameters

The platform crawls up to 2,500 pages by default, with expansion possible to 15,000 pages.

Crawling configurations

JavaScript Handling

For single-page applications, use predefined presets and adjust DOM load timeouts and simulated element limits.

Javascript configurations

CSS Selector Exclusion

Exclude specific website sections from scanning using CSS selectors.

Exclude by CSS

Proof-Based Scanning

Disable proof generation by unchecking the “Enable Proof Generation” option.

Attacking configurations

Form Value Configuration

Customize default form values used when attacking contact forms.

Configure Form Values

Brute Force Settings

The tool attempts authentication forms using basic username/password combinations.

The default wordlist contains 59 entries, expandable to 5,000 with an Internal Agent or Invicti Standard.

Configure Brute Force

Request Configuration

Set the user-agent string and adjust request rate per second to control scan speed.

Configure Requests

Product Editions

Invicti Standard

Single-instance Windows-only scanning tool primarily used by penetration testers and cybersecurity engineers for initial vulnerability discovery.

Invicti Team

  • Cloud-only deployment (AWS US or AWS EU)
  • Supports internal application scanning via agents (Windows, Linux, Docker)
  • Unlimited users
  • Includes standard features

Invicti Enterprise

Target organizations with 50+ websites requiring enterprise-grade features.

Key Features

  • Cloud and on-premise deployment options (Windows only for on-premise)
  • Unlimited users
  • Internal application scanning via agents (Windows, Linux, Docker)
  • Dedicated technical support
  • Custom integration support
  • Includes Team and Standard capabilities

Firewall Whitelisting

IP Address Whitelisting

Whitelist scanning traffic by source IP.

Invicti AWS (US):

  • 54.88.149.100
  • 54.85.169.114

Invicti AWS (EU):

  • 3.121.126.156
  • 3.122.64.138

Common Questions

Email Notifications

If receiving unsolicited Invicti emails, unauthorized scanning may be occurring.

The platform uses “[email protected]” by default in contact forms, potentially generating numerous emails during scans.

Contact [email protected] for suspected unauthorized activity.

Scan Duration

Typical scans complete in 8-10 hours, depending on application size and complexity.

Scans should not exceed 24 hours.

Contact [email protected] for speed optimization guidance.

Note: Formed from merger of Acunetix and Netsparker. Acquired Kondukto (2024) for ASPM capabilities. Acunetix continues as standalone product.

Frequently Asked Questions

What is Invicti's proof-based scanning?
Invicti automatically exploits detected vulnerabilities in a safe way to confirm they are real, not theoretical. This produces a proof of exploit for each finding, so teams spend less time triaging false positives.
Is there a free version of Invicti?
No. Invicti is an enterprise-focused commercial product without a free tier. Pricing is based on the number of scan targets and the deployment model you choose (cloud or on-premises).
What is the difference between Invicti and Acunetix?
Both are owned by the same parent company. Invicti targets larger enterprise teams with features like role-based access, advanced workflow integrations, and multi-engine scanning. Acunetix is positioned for small to mid-sized teams that want a simpler, more affordable DAST solution.
Does Invicti integrate with issue trackers and CI/CD tools?
Yes. Invicti has built-in integrations with Jira, Azure DevOps, GitLab, Jenkins, and others. Scan results can be pushed directly into your ticketing system and scans can be triggered automatically as part of your deployment pipeline.

Complement with IAST

Pair dynamic testing with runtime instrumentation for broader coverage.

See all IAST tools

Comments

Powered by Giscus — comments are stored in GitHub Discussions.