Audience

Large enterprises needing a solution to build and execute offensive security automation workflows

About Trickest

Join us in our mission to democratize offensive security with tailored best-in-class solutions that address the unique needs of professionals and organizations. Evolve from the terminal to a specialized IDE for offensive security. Use Trickest’s library of tool nodes, import your own scripts, or drop in your favorite open-source tools all in one place. Choose from template workflows for common tasks and a growing list of 300+ open source tools the security community loves. Run your workflows in the cloud with easy autoscaling and cost controls. Skip manual infrastructure setup and stop paying for idle VPSs. No more digging through filesystems for your old runs, use Trickest’s spaces, projects, and workflow versioning to stay on top of even the most complex projects. Trickest is for anyone who interacts with offensive security: enterprise security teams, red teams, purple teams, specialized pen testers, bug bounty hunters, security researchers, educators, etc.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Trickest
United States
trickest.com

Videos and Screen Captures

Trickest Screenshot 1
You Might Also Like
SKUDONET Open Source Load Balancer Icon
SKUDONET Open Source Load Balancer

Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

SKUDONET ADC, operates at the application layer, efficiently distributing network load and application load across multiple servers. This not only enhances the performance of your application but also ensures that your web servers can handle more traffic seamlessly.

Product Details

Platforms Supported
SaaS
Training
Documentation
Live Online
In Person
Support
Online

Trickest Frequently Asked Questions

Q: What kinds of users and organization types does Trickest work with?
Q: What languages does Trickest support in their product?
Q: What kind of support options does Trickest offer?
Q: What type of training does Trickest provide?

Trickest Product Features

Vulnerability Scanners

Network Mapping
Web Inspection
Defect Tracking
Interactive Scanning
Perimeter Scanning
Black Box Scanning
Continuous Monitoring
Compliance Monitoring
Asset Discovery
Logging and Reporting
Threat Intelligence
Risk Analysis

Trickest Additional Categories