Software Alternatives & Reviews

Tamper Data VS Rapid7 MetaSploit

Compare Tamper Data VS Rapid7 MetaSploit and see what are their differences

Tamper Data logo Tamper Data

Firefox add-on that lets you change headers and request parameters before they're sent to the...

Rapid7 MetaSploit logo Rapid7 MetaSploit

Penetration testing solution for risk validation.
  • Tamper Data Landing page
    Landing page //
    2019-05-27
  • Rapid7 MetaSploit Landing page
    Landing page //
    2023-07-11

Tamper Data videos

teste

More videos:

  • Tutorial - How to cache Tamper Data and modify price, quantity | cyber security hacks| #2
  • Review - Cara Install Tamper Data Di Firefox Terbaru 2019

Rapid7 MetaSploit videos

No Rapid7 MetaSploit videos yet. You could help us improve this page by suggesting one.

+ Add video

Category Popularity

0-100% (relative to Tamper Data and Rapid7 MetaSploit)
Monitoring Tools
30 30%
70% 70
Security
32 32%
68% 68
Network & Admin
32 32%
68% 68
Security & Privacy
22 22%
78% 78

User comments

Share your experience with using Tamper Data and Rapid7 MetaSploit. For example, how are they different and which one is better?
Log in or Post with

What are some alternatives?

When comparing Tamper Data and Rapid7 MetaSploit, you can also consider the following products

Horangi - Horangi is a leading cyber-security solution that provides instant response and threat detection for companies who lack the time and expertise to monitor their system.

Acunetix - Audit your website security and web applications for SQL injection, Cross site scripting and other...

Intruder - Intruder is a security monitoring platform for internet-facing systems.

PracticeProtect - Network security & identity management

HTTPCS Security - Cyber security solution for protecting websites and web apps

Skybox Vulnerability Control - Skybox Vulnerability Control is an industry-leading cyber-security management solution that allows threat-centric vulnerability prioritization and scan-less vulnerability assessments in order to address security challenges within large and complicat…