Invicti represents an enterprise-grade DAST platform that merges DAST, IAST, and SCA capabilities into one solution.
The tool scans websites and APIs for security vulnerabilities and has been adopted by over 3,100 companies globally.
It evolved from Netsparker, one of the industry’s most recognized dynamic analysis tools.

Primary Use Cases
Vulnerability Detection
Invicti identifies web application security issues including SQL injection and cross-site scripting (XSS) attacks.

Software Composition Analysis
Beyond vulnerability scanning, the platform catalogs technologies within web applications and monitors these libraries proactively.

DevSecOps Integration
Most organizations incorporate Invicti into their DevSecOps workflows.

Discovery Feature
The Discovery function activates automatically upon account creation, automatically identifying websites potentially associated with your organization through multiple data sources:
- Business email domain matching
- Out-of-scope links from scans
- Websites hosted on identical IP addresses
- SSL certificate organization names
- Domain keyword and second-level domain analysis

Since automated discovery isn’t perfect, filtering capabilities help eliminate unrelated results.

Website Management
Adding Targets
You can add websites individually or import multiple targets via CSV.
Websites support membership across multiple groups for organizational flexibility based on:
- Hosting infrastructure
- Technology stack
- Geographic location
- Team assignment
- Priority levels


Group Scanning
Group assignments enable batch scanning operations across related targets.

Scan Configuration
Scan Profiles
Save and share scan configurations across team members.

Scan Policies
Pre-built Options
Select from standard policies including OWASP Top 10 or PCI compliance checks.

Custom Policy Creation

Security Checks Configuration
Customize which vulnerability types to scan, such as focusing exclusively on out-of-band SQL injection detection.

Crawling Parameters
The platform crawls up to 2,500 pages by default, with expansion possible to 15,000 pages.

JavaScript Handling
For single-page applications, use predefined presets and adjust DOM load timeouts and simulated element limits.

CSS Selector Exclusion
Exclude specific website sections from scanning using CSS selectors.

Proof-Based Scanning
Disable proof generation by unchecking the “Enable Proof Generation” option.

Form Value Configuration
Customize default form values used when attacking contact forms.

Brute Force Settings
The tool attempts authentication forms using basic username/password combinations.
The default wordlist contains 59 entries, expandable to 5,000 with an Internal Agent or Invicti Standard.

Request Configuration
Set the user-agent string and adjust request rate per second to control scan speed.

Product Editions
Invicti Standard
Single-instance Windows-only scanning tool primarily used by penetration testers and cybersecurity engineers for initial vulnerability discovery.
Invicti Team
- Cloud-only deployment (AWS US or AWS EU)
- Supports internal application scanning via agents (Windows, Linux, Docker)
- Unlimited users
- Includes standard features
Invicti Enterprise
Target organizations with 50+ websites requiring enterprise-grade features.
Key Features
- Cloud and on-premise deployment options (Windows only for on-premise)
- Unlimited users
- Internal application scanning via agents (Windows, Linux, Docker)
- Dedicated technical support
- Custom integration support
- Includes Team and Standard capabilities
Firewall Whitelisting
IP Address Whitelisting
Whitelist scanning traffic by source IP.
Invicti AWS (US):
- 54.88.149.100
- 54.85.169.114
Invicti AWS (EU):
- 3.121.126.156
- 3.122.64.138
Common Questions
Email Notifications
If receiving unsolicited Invicti emails, unauthorized scanning may be occurring.
The platform uses “invicti@example.com” by default in contact forms, potentially generating numerous emails during scans.
Contact support@invicti.com for suspected unauthorized activity.
Scan Duration
Typical scans complete in 8-10 hours, depending on application size and complexity.
Scans should not exceed 24 hours.
Contact support@invicti.com for speed optimization guidance.
Note: Formed from merger of Acunetix and Netsparker. Acquired Kondukto (2024) for ASPM capabilities. Acunetix continues as standalone product.
