Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Support
  • Get a demo

INTEGRATE WITH OTHER TOOLS AND APPLICATIONS USING

Acunetix Imports, Exports, and API

Get a demo
Gartner Peer Insights Reviews

Integrating Acunetix with Other Applications

You can integrate Acunetix not only with issue trackers and CI/CD software but with many other systems. You can use data from many other applications to seed your Acunetix scans and you can also use Acunetix scan results in other applications.
Acunetix Imports

Importing Data into Acunetix

You can import data into Acunetix to use it before crawling the target application. In most cases, this is not necessary but sometimes parts of the web application are not linked or otherwise hidden from crawlers. You can import crawl data from the following applications and in the following formats:
  • Web browser automation tools: Selenium
  • Security testing proxies: Telerik Fiddler, Postman, Burp
  • RESTful API definition languages: Swagger 2.0 and 3.0, and WADL
  • SOAP API Definition Languages: WSDL
  • ASP.NET Web Forms project files, HTTP archives (HAR), or simple text files with a list of URLs
Acunetix Exports

Exporting Data from Acunetix

You can export the Acunetix scan results to be used directly as web application firewall (WAF) rules. This allows you to temporarily prevent attackers from exploiting high-severity vulnerabilities until you are able to fix them. You can export data that can be used directly by the following WAFs:
  • Imperva SecureSphere
  • F5 BIG-IP Application Security Manager
  • Fortinet FortiWeb
  • Citrix Web Application Firewall
You can also export Acunetix scan results to XML in a generic format that you can use in other/custom applications.
API

Working with the Acunetix API

In addition to import and export capabilities and easy-to-configure integrations, all Acunetix capabilities are available using a RESTful API. Using the API, you can access all the product features: manage targets, run scans, get scan results, get vulnerability details, and more. Using the API, you can integrate Acunetix with any other system in your environment. In the case of enterprise customers, Acunetix experts can help to build integration and/or provide custom options.

Recommended reading

Learn more about prominent vulnerabilities, keep up with recent product updates, and catch the latest news from Acunetix.

Knowledge Sharing

Knowledge Sharing

What is SQL Injection

What is Cross-site Scripting

What Are XML External Entity Attacks

What is Insecure Deserialization

Popular Posts

Popular Posts

SQL Injection Example

Preventing SQL Injection in PHP

TLS/SSL Cipher Hardening

Defending Against CSRF Attacks

In The News

In The News

2020 Web Application Vulnerability Report

Complimentary licenses – COVID-19

Interview with Acunetix President & COO

Innovations in Acunetix v13

Client: Xerox

“We use Acunetix as part of our Security in the SDLC and to test code in DEV and SIT before being promoted to Production.”

Kurt Zanzi, Xerox CA-MMIS Information Securtiy Office, Xerox
Read more case studies >

Take action and discover your vulnerabilities

Get a demo
Client: AWS
Client: Cognizant
Client: Garmin
Client: Airforce
Client: NASA
Client: American Express
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Support
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2024, by Invicti