High-quality customisable reports, on-demand and at the click of a button.
Integrated, Centralised & Rich Issue Library. Stop re-inventing the wheel.
Tools and workflows to reduce project overheads and costs by up to 40%.
Collaborate with your team, client and developers.
Pre-loaded with industry benchmarks and methodologies, out of the box.
See the attack from hacker's perspective. Chain vulnerabilities together.
Still interested? Try AttackForge.com
High-Quality Automated Reports
On-demand reporting at the click of a button, whenever you or the client needs it. Reports can be customised and includes templates for Executives, Risk Managers, Third-Parties such as Auditors, and Developers. All reports can be downloaded in PDF, HTML, DOCX, CSV and JSON. JSON export allows you to integrate AttackForge into your own custom report templates.
Built For Red Teams
Build Attack Chains quickly and effortlessly to help demonstrate exactly what an attacker is doing at every step - in a simple and clear visual story. Help your clients understand your attack paths and focus remediation where its needed.
Rich Issue Library With Over 1300 Vulnerabilities
Immediately access every CWE, CAPEC and other industry standard vulnerability definitions, or create your own. Save time on reporting - it takes on average less than 30 seconds to add a vulnerability to your pentest. No traditional report writing required.
Build Up Your Team and Collaborate
Connect with People to build your dream team and share your vulnerability libraries and test suites. Combine your hard work and avoid reinventing the wheel. Intended for small pentest teams or collaborative groups of freelancers.
Custom Methodologies & Test Cases
AttackForge comes pre-loaded with common industry benchmarks from OWASP, OSSTMM and others. However you can build your own custom methodologies for Red Team assessments, OSINT, Physical Security sssessments - your only limited by your creativity! You can capture evidence against every test case too.
Personalise Your Theme
Enable Stealth Mode for the full hacker experience. You can change themes at any time. More themes coming soon!
Do more with AttackForge.com
Our prices are very easy to understand. There's no extra or hidden fees. You just pay what is listed here. You can cancel at any time.
/ user /
Create Pentesting Projects
Invite People to Your Projects
Automated & On-Demand Reports
Integrate Into Your Own Reports
Custom Vulnerability Library - Preloaded 1300+ Vulnerabilities
JIRA / Slack / ServiceNow Integration
All amounts are in US Dollars
/ user /
Everything in Free
Customise Your Reports
Unlimited Invitations To Your Projects
Create Teams To Share Knowledge
Access Powerful Analytics
Custom Test Suites
Unlimited Project Scope & Uploads
All amounts are in US Dollars
|Global Dashboard For All Your Vulnerabilities|
|View & Search Vulnerabilities by Project, Asset, Priority and Status|
|Track by Open, Closed and Ready For Retest|
|Analytics & Trends Discovery|
|Create Attack Chains|
|Export & Sync Vulnerabilities With Your JIRA Project|
|Export Vulnerabilities Into Your ServiceNow Tenant|
|Detailed Vulnerability Information|
|Upload and Store Vulnerability Evidence & Artefacts||(Limited)|
|Audit Logs For Life of Vulnerability|
|Access & Manage Vulnerability Library (1300+ Vulnerabilities)|
|Share Vulnerability Library with Team|
|Choose When Your Vulnerabilities Are Visible To Project Team|
|Global Dashboard For All Your Projects|
|Create & Manage Projects||(Limited)|
|Daily Notifications on Start/Stop Testing|
|Project Overview & Dashboard|
|Secure Workspace For File Uploads||(Limited)|
|View & Action Test Cases|
|Access Test Suites & Methodologies From OWASP, NIST, PCI, OSSTMM & Others|
|Create Your Own Test Suites & Methodologies|
|Share Custom Test Suites & Methodologies with Team|
|Storage For Testing Logs||(Limited)|
|User Access Management|
|Invite People To Collaborate on Your Projects|
|Scheduling & Calendar|
|Private Slack Channels For Communication|
|Request, Track and Perform Remediation Testing|
|Invite People To Your Team|
|Automated & On-Demand Reporting|
|Detailed Vulnerability Reports (PDF, HTML, DOCX, CSV, JSON)|
|Export JSON Into Your Own Reports and Tools|
|Customise Executive Summary|
|Templates for Executives, Auditors, 3rd Parties, Developers|
|Customise Your Reports|
|Upload & Add Your Own Logo To Reports|
|Rebrand DOCX For Your Own Needs|
|Mandatory Two-Factor Authentication|
|Encrypted Communications & Storage|
|Role-Based Access Controls On Projects|
|In-built Knowledgebase For Help & Support|
|Priority Email Support|