0d1n |
|
[Source] |
Automate customized attacks against web applications |
C |
Free |
False |
1u.ms |
[Website] |
[Source] |
zero-configuration DNS utilities for assisting in detection and exploitation of SSRF-related vulnerabilities |
Go |
Free |
True |
230-OOB |
[Website] |
[Source] |
FTP server for OOB XXE attacks |
Python |
Free |
False |
Acunetix |
[Website] |
|
Web application security scanner |
|
Paid |
True |
afrog |
|
[Source] |
Web vulnerability scanner, based on templates |
Go |
Free |
False |
Afuzz |
|
[Source] |
Web directory and file scanner (wordlist bruteforce) |
Python |
Free |
False |
altair |
|
[Source] |
Modular web vulnerability scanner |
Python |
Free |
False |
API-fuzzer |
|
[Source] |
Library to fuzz request attributes using common pentesting techniques and lists vulnerabilities |
Ruby |
Free |
False |
Aquatone |
[Website] |
[Source] |
Domain flyover tool; visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface |
Go |
Free |
False |
Arachni |
[Website] |
[Source] |
Web application security scanner framework |
Ruby |
Free |
False |
Arjun |
|
[Source] |
HTTP parameter discovery suite |
Python |
Free |
False |
AssassinGo |
[Website] |
[Source] |
Web pentest framework for information gathering and vulnerability scanning |
Go |
Free |
False |
Astra |
[Website] |
[Source] |
REST API penetration testing tool |
Python |
Free |
False |
Atlas |
|
[Source] |
Tool that suggests sqlmap tampers to bypass WAF/IDS/IPS based on status codes |
Python |
Free |
False |
b374k |
|
[Source] |
Webshell with many features: file manager, search, command execution, DB connection, SQL explorer, process list |
PHP |
Free |
False |
badsecrets |
|
[Source] |
A library for detecting known or weak cryptographic secrets across many web frameworks |
Python |
Free |
False |
BaRMIe |
|
[Source] |
Java RMI enumeration and attack tool |
Java |
Free |
False |
Beeceptor |
[Website] |
|
HTTP request collector and inspector |
|
Paid |
True |
BeEF |
[Website] |
[Source] |
Browser exploitation framework; JS payload and supporting software to be used as XSS payload or post exploitation implant to monitor or exploit users as they use the targeted application |
Ruby |
Free |
False |
BFAC |
|
[Source] |
Backup File Artifacts Checker; automated backup artifacts checker |
Python |
Free |
False |
Blazy |
|
[Source] |
Login page bruteforcer: CSRF, SQLi, Clickjacking, WAF detection |
Python |
Free |
False |
Burp Suite |
[Website] |
|
Intercepting proxy to replay, inject, scan and fuzz HTTP requests (a limited free version exists) |
Java |
Paid |
False |
bXSS |
[Website] |
|
Identify blind cross-site scripting |
JavaScript |
Free |
False |
Caido |
[Website] |
|
Intercepting proxy to replay, inject, scan and fuzz HTTP requests (a limited free version exists) |
Rust |
Paid |
False |
Cansina |
|
[Source] |
Web directory and file scanner (wordlist bruteforce) |
Python |
Free |
False |
Chankro |
|
[Source] |
Tool to bypass disable_functions and open_basedir in PHP by calling sendmail and setting LD_PRELOAD environment variable |
Python |
Free |
False |
Charles |
[Website] |
|
Intercepting proxy to replay, inject, scan and fuzz HTTP requests |
Java |
Paid |
False |
ChopChop |
|
[Source] |
Web application security scanner based on templates |
Go |
Free |
False |
clairvoyance |
|
[Source] |
Obtain GraphQL API schema even if the introspection is disabled by abusing the "did you mean" feature |
Python |
Free |
False |
CloakQuest3r |
|
[Source] |
Uncover the true IP address of websites safeguarded by Cloudflare and other CDNs |
Python |
Free |
False |
CloudFlair |
[Website] |
[Source] |
Uncover the true IP address of websites safeguarded by Cloudflare and CloudFront |
Python |
Free |
False |
CloudFrunt |
|
[Source] |
Scanner to identify misconfigured CloudFront domains |
Python |
Free |
False |
CMSeek |
|
[Source] |
CMS detection and exploitation suite; capable of detecting more than 180 CMS |
Python |
Free |
False |
CMSmap |
|
[Source] |
WordPress, Joomla, Drupal, Moodle CMS security scanner |
Python |
Free |
False |
CMSScan |
|
[Source] |
Wordpress, Drupal, Joomla, vBulletin CMS security scanner with dashboard |
Python |
Free |
False |
commix |
[Website] |
[Source] |
Web-based command injection tester |
Python |
Free |
False |
CrackQL |
|
[Source] |
GraphQL password brute-force and fuzzing utility |
Python |
Free |
False |
CSP Evaluator |
[Website] |
[Source] |
Check Content Security Policy (CSP) configuration and assists with the reviewing process |
JavaScript |
Free |
False |
CSPass |
|
[Source] |
Test for CSP bypass payloads |
Python |
Free |
False |
CSWSH |
[Website] |
|
Cross-Site WebSocket Hijacking Tester |
|
Free |
False |
Dalfox |
[Website] |
[Source] |
XSS scanner and utility focused on automation |
Go |
Free |
False |
dirb |
[Website] |
[Source] |
Web directory and file scanner (wordlist bruteforce) |
|
Free |
False |
dirbuster |
[Website] |
[Source] |
Web directory and file scanner (wordlist bruteforce) |
Java |
Free |
False |
dirsearch |
|
[Source] |
Web directory and file scanner (wordlist bruteforce) |
Python |
Free |
False |
distributed-jwt-cracker |
[Website] |
[Source] |
HS256 JWT token distributed brute force cracker |
JavaScript |
Free |
False |
docem |
|
[Source] |
Uility to embed XXE and XSS payloads in docx, odt, pptx, etc |
Python |
Free |
False |
DotDotPwn |
[Website] |
[Source] |
Directory Traversal fuzzer |
Perl |
Free |
False |
DotGit |
|
[Source] |
Web browser extension (Firefox and CHromium) checking if .git is exposed in visited websites |
JavaScript |
Free |
False |
droopescan |
|
[Source] |
CMS scanner supporting SilverStripe and Wordpress, having partial support for Joomla, Moodle, Drupal |
Python |
Free |
False |
drupwn |
|
[Source] |
Drupal CMS enumeration and exploitation tool |
Python |
Free |
False |
dtd-finder |
|
[Source] |
Identify DTDs on filesystem snapshot and build XXE payloads using those local DTDs |
Kotlin |
Free |
False |
DVCS-Pillage |
|
[Source] |
Dump web accessible (distributed) version control systems (DVCS/VCS): GIT, Mercurial/hg, Bazaar/bzr, … |
Shell |
Free |
False |
dvcs-ripper |
|
[Source] |
Dump web accessible (distributed) version control systems (DVCS/VCS): SVN, GIT, Mercurial/hg, Bazaar/bzr, … |
Perl |
Free |
False |
Enemies Of Symfony |
|
[Source] |
Loots information from a Symfony target using profiler |
Python |
Free |
False |
Eyeballer |
|
[Source] |
Convolutional neural network for analyzing pentest screenshots and automatically label them |
Python |
Free |
False |
EyeWitness |
|
[Source] |
Take screenshots of websites, provide some server header info, and identify default credentials if possible |
Python |
Free |
False |
ezXSS |
|
[Source] |
Identify blind cross-site scripting |
PHP |
Free |
False |
Fav-up |
|
[Source] |
Favicon fingerprinting using Shodan |
Python |
Free |
False |
FavFreak |
|
[Source] |
Favicon fingerprinting |
Python |
Free |
False |
Favinizer |
|
[Source] |
Favicon fingerprinting |
Python |
Free |
False |
feroxbuster |
|
[Source] |
Web directory and file scanner (wordlist bruteforce) |
Rust |
Free |
False |
ffuf |
|
[Source] |
Web directory and file scanner (wordlist bruteforce); but also a web fuzzer |
Go |
Free |
False |
Fingerprinter |
|
[Source] |
CMS version detection tool |
Ruby |
Free |
False |
Firefly |
|
[Source] |
Web directory and file scanner (wordlist bruteforce); but also a web fuzzer |
Go |
Free |
False |
Flask Session Cookie Decoder/Encoder |
|
[Source] |
A script that let you encode and decode a Flask session cookie |
Python |
Free |
False |
FockCache |
|
[Source] |
Test Cache Poisoning |
Go |
Free |
False |
Fuxi |
|
[Source] |
Penetration testing platform, automate some scan & attack |
Python |
Free |
False |
fuxploider |
|
[Source] |
Automates the process of detecting and exploiting file upload forms flaws |
Python |
Free |
False |
Fuzzapi |
|
[Source] |
Web-UI for API-fuzzer |
Ruby |
Free |
False |
Ghauri |
|
[Source] |
Automatic SQL injection and database takeover; inspired by SQLmap |
Python |
Free |
False |
git-dump |
|
[Source] |
Dump the contents of a remote git repository without directory listing enabled |
JavaScript |
Free |
False |
git-dumper |
|
[Source] |
Dump the contents of a remote git repository without directory listing enabled |
Python |
Free |
False |
GitTools |
|
[Source] |
3 tools: Finder (find websites with .git repository exposed), Dumper (dump exposed .git), Extractor (extract commits and their content from a broken repository) |
Shell |
Free |
False |
Gobuster |
|
[Source] |
Web directory, file and DNS scanner (wordlist bruteforce) |
Go |
Free |
False |
gofingerprint |
|
[Source] |
Indentify web servers by checking their HTTP responses against a user defined list of fingerprints |
Go |
Free |
False |
goop |
|
[Source] |
Dump the contents of a remote git repository without directory listing enabled; focus on as-complete-as-possible dumps and handling as many edge-cases as possible |
Go |
Free |
False |
Gopherus |
|
[Source] |
Generates gopher link for exploiting SSRF and gaining RCE access from unprotected services |
Python |
Free |
False |
gowitness |
|
[Source] |
Take screenshots of websites |
Go |
Free |
False |
GraphCrawler |
|
[Source] |
GraphQL automated security testing |
Python |
Free |
False |
Graphicator |
|
[Source] |
GraphQL enumeration and extraction |
Python |
Free |
False |
Graphinder |
|
[Source] |
GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce |
Python |
Free |
False |
GraphMan |
|
[Source] |
Scaffold a postman collection for a GraphQL API; compatible with Postman and Insomnia |
TypeScript |
Free |
False |
GraphQL Cop |
|
[Source] |
Run common security tests against GraphQL |
Python |
Free |
False |
GraphQL Voyager |
[Website] |
[Source] |
Represent any GraphQL API as an interactive graph |
TypeScript |
Free |
False |
graphql-path-enum |
|
[Source] |
Lists the different ways of reaching a given type in a GraphQL schema |
Rust |
Free |
False |
graphql.security |
[Website] |
|
Runs a dozen of security checks against a given GraphQL endpoint |
|
Free |
True |
GraphQLmap |
|
[Source] |
Scripting engine to interact with a graphql endpoint for pentesting purposes |
Python |
Free |
False |
graphw00f |
|
[Source] |
GraphQL server engine fingerprinting |
Python |
Free |
False |
Guppy Proxy |
|
[Source] |
GUI HTTP intercepting proxy based on Pappy Proxy |
Python |
Free |
False |
Hetty |
[Website] |
[Source] |
HTTP toolkit for security research; alternative to BurpSuite |
Go |
Free |
False |
Hookbin |
[Website] |
[Source] |
HTTP request collector and inspector |
Java |
Free |
True |
http-garden |
|
[Source] |
Differential testing and fuzzing of HTTP servers and proxies |
Python |
Free |
False |
httpscreenshot |
|
[Source] |
Take screenshots of websites |
Python |
Free |
False |
httpx |
|
[Source] |
Multi-purpose HTTP toolkit allows to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads |
Go |
Free |
False |
HUNT |
|
[Source] |
HUNT Suite is a collection of Burp Suite Pro/Free and OWASP ZAP extensions |
Python |
Free |
True |
InQL |
|
[Source] |
GraphQL security audit |
Python |
Free |
False |
Interactsh |
[Website] |
[Source] |
HTTP request collector and inspector; OOB interaction gathering server and client library; DNS / HTTP / SMTP interaction support |
Go |
Free |
True |
Intrigue Core |
[Website] |
[Source] |
Framework for discovering attack surface |
Ruby |
Free |
False |
IronWASP |
[Website] |
[Source] |
Web security/vulnerability scanner (native for Windows only) |
C |
Free |
False |
Jaeles |
[Website] |
[Source] |
Framework for building your own Web Application Scanner |
Go |
Free |
False |
JAST |
|
[Source] |
Take screenshots of websites |
Python |
Free |
False |
JS-Tap |
|
[Source] |
Browser exploitation framework; JS payload and supporting software to be used as XSS payload or post exploitation implant to monitor or exploit users as they use the targeted application |
Python |
Free |
False |
JSONBee |
|
[Source] |
JSONP endpoints/payloads to help bypass content security policy of different websites |
PHP |
Free |
False |
JWT cracker |
|
[Source] |
Multi-threaded JWT brute-force cracker |
C |
Free |
False |
jwt-cracker |
[Website] |
[Source] |
HS256 JWT token brute force cracker |
JavaScript |
Free |
False |
jwt-hack |
|
[Source] |
A toolkit for JWT tokens security testing |
Go |
Free |
False |
jwtcat |
|
[Source] |
JWT brute-force cracker |
Python |
Free |
False |
jwt_tool |
|
[Source] |
A toolkit for validating, forging and cracking JWT tokens |
Python |
Free |
False |
Kadimus |
|
[Source] |
LFI, RFI, RCE scanner |
C |
Free |
False |
Katana |
|
[Source] |
Crawling and spidering framework, supporting headless mode, JavaScript, customizable automatic form filling and scope control |
Go |
Free |
False |
Kraken |
|
[Source] |
Modular multi-language webshell focused on web post-exploitation and defense evasion; supports PHP, JSP and ASPX |
Python |
Free |
False |
LFI Freak |
|
[Source] |
LFI scan and exploit tool |
Python |
Free |
False |
LFI Suite |
|
[Source] |
Automatic LFI scanner and exploiter |
Python |
Free |
False |
Liffy |
|
[Source] |
LFI exploitation tool |
Python |
Free |
False |
LightBulb |
[Website] |
[Source] |
Framework for auditing web application firewalls and filters |
Python |
Free |
False |
LinkFinder |
[Website] |
[Source] |
Find URL endpoints and their parameters in JavaScript files |
Python |
Free |
False |
Lulzbuster |
|
[Source] |
Web directory and file scanner (wordlist bruteforce) |
C |
Free |
False |
Malzilla |
[Website] |
[Source] |
Web oriented deobfuscating tool |
|
Free |
False |
mitmproxy |
[Website] |
[Source] |
Interactive HTTPS proxy |
Python |
Free |
False |
Mockbin |
[Website] |
[Source] |
HTTP request collector and inspector |
JavaScript |
Free |
True |
monsoon |
[Website] |
[Source] |
Web directory and file scanner (wordlist bruteforce) |
Go |
Free |
False |
MyJWT |
|
[Source] |
A toolkit for signing, forging and cracking JWT tokens |
Python |
Free |
False |
Netsparker |
[Website] |
|
Web application security scanner |
|
Paid |
True |
nikto |
[Website] |
[Source] |
Very light web security scanner |
Perl |
Free |
False |
noir |
[Website] |
[Source] |
Attack surface detector that identifies endpoints by static analysis and then conduct dynamic analysis on them |
Crystal |
Free |
False |
Nosql-Exploitation-Framework |
|
[Source] |
NoSQL scanning and exploitation framework |
Python |
Free |
False |
NoSQLMap |
|
[Source] |
Automated NoSQL database enumeration and web application exploitation tool |
Python |
Free |
False |
NtHiM |
|
[Source] |
Now, the Host is Mine!; sub-domain takeover detection |
Rust |
Free |
False |
Nuclei |
[Website] |
[Source] |
Web application security scanner based on templates |
Go |
Free |
False |
otori |
[Website] |
|
On The Outside, Reaching In, exploitation toolbox for XXE attacks |
Python |
Free |
False |
OWASP JoomScan |
|
[Source] |
Joomla vulnerability scanner |
Perl |
Free |
False |
OWASP ZAP |
[Website] |
[Source] |
OWASP Zed Attack Proxy, intercepting proxy to replay, inject, scan and fuzz HTTP requests |
Java |
Free |
False |
oxml_xxe |
|
[Source] |
Tool for embedding XXE/XML exploits into different filetypes (docx/xlsx, odt/ods, svg, xml, etc.) |
Ruby |
Free |
False |
Panoptic |
[Website] |
[Source] |
Automatic LFI and Path Traversal exploitation tool |
Python |
Free |
False |
Pappy Proxy |
[Website] |
[Source] |
Proxy Attack Proxy ProxY, HTTP intercepting proxy |
Python |
Free |
False |
parameth |
|
[Source] |
HTTP parameter discovery suite |
Python |
Free |
False |
ParamSpider |
|
[Source] |
Finds parameters from web archives of the entered domain |
Python |
Free |
False |
Paros |
|
[Source] |
Intercepting proxy to replay, inject, scan and fuzz HTTP requests |
Java |
Free |
False |
PeepingTom |
|
[Source] |
Take screenshots of websites |
Python |
Free |
False |
PHPGGC |
|
[Source] |
PHP Generic Gadget Chains, library of unserialize() payloads along with a tool to generate them, supporting various PHP frameworks |
PHP |
Free |
False |
Pinkerton |
|
[Source] |
Crawl JavaScript file to find secret |
Python |
Free |
False |
Portswigger Labs Inspector |
[Website] |
|
Javascript expression evaluator and inspector |
JavaScript |
Free |
True |
PowerUpSQL |
|
[Source] |
Toolkit for attacking MS SQL Server, discovery, configuration auditing, privilege escalation, post exploitation |
Powershell |
Free |
False |
ppfuzz |
|
[Source] |
Scan for client-side prototype pollution |
Rust |
Free |
False |
pphack |
|
[Source] |
Client-side prototype pollution scanner |
Go |
Free |
False |
Rabid |
[Website] |
[Source] |
CLI tool and library allowing to simply decode all kind of BigIP cookies |
Ruby |
Free |
True |
Request Inspector |
[Website] |
|
HTTP request collector and inspector |
|
Free |
True |
RequestBin |
[Website] |
[Source] |
HTTP request collector and inspector |
Python |
Free |
True |
RequestCatcher |
[Website] |
[Source] |
HTTP request collector and inspector |
Go |
Free |
True |
Retire.js |
[Website] |
[Source] |
Scanner detecting the use of JavaScript libraries with known vulnerabilities |
JavaScript |
Free |
False |
Rogue JNDI |
|
[Source] |
A malicious LDAP server for JNDI injection attacks |
Java |
Free |
False |
ronin-vulns |
|
[Source] |
Tests URLs for Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL injection (SQLi), Cross Site Scripting (XSS), Server Side Template Injection (SSTI), and Open Redirects |
Ruby |
Free |
False |
rustbuster |
|
[Source] |
Web directory, file and DNS scanner (wordlist bruteforce); but also a web fuzzer |
Rust |
Free |
False |
Scout |
|
[Source] |
Web directory and file scanner (wordlist bruteforce) |
Go |
Free |
False |
secureCodeBox |
[Website] |
[Source] |
Continuous security scans based on kubernetes; orchestrate and automate a bunch of security-testing tools |
Go |
Free |
False |
See-SURF |
|
[Source] |
SSRF scanner to find entry points |
Python |
Free |
False |
Session Hijacking Visual Exploitation |
|
[Source] |
Hijack user sessions by injecting malicious JavaScript code |
JavaScript |
Free |
False |
ShapeShifter |
|
[Source] |
GraphQL schema extraction to JSON file with introspection |
Python |
Free |
False |
Simple Local File Inclusion Exploiter |
[Website] |
[Source] |
LFI exploit tool |
Python |
Free |
False |
Sitadel |
|
[Source] |
Web application security scanner, rewrite and newer version of WAScan |
Python |
Free |
False |
sj |
|
[Source] |
Swagger Jacker; audit API endpoints defined in exposed (Swagger/OpenAPI) definition files |
Go |
Free |
False |
SleuthQL |
|
[Source] |
Tool that parses Burp history to discover potential SQL injection points and prepare SQLmap request files |
Python |
Free |
False |
Smuggler |
|
[Source] |
HTTP request smuggling, desync testing |
Python |
Free |
False |
snallygaster |
|
[Source] |
Web scanner that looks for files accessible on web servers that shouldn't be public |
Python |
Free |
False |
spidr |
|
[Source] |
Web spidering library that can spider a site, multiple domains, certain links or infinitely |
Ruby |
Free |
False |
SqliSniper |
|
[Source] |
Time-based blind SQL injection fuzzer for HTTP headers |
Python |
Free |
False |
SQLiv |
|
[Source] |
SQL injection scanner, find vulnerable entry points |
Python |
Free |
False |
sqlmap |
[Website] |
[Source] |
Automatic SQL injection and database takeover |
Python |
Free |
False |
ssllabs-scan |
[Website] |
[Source] |
CLI reference-implementation client for Qualys SSL Labs APIs, designed for automated and/or bulk testing |
Go |
Free |
False |
sslscan2 |
|
[Source] |
Tests SSL/TLS enabled services to discover supported cipher suites |
C |
Free |
False |
SSLyze |
|
[Source] |
SSL analysis library and a CLI tools |
Python |
Free |
False |
SSRF Proxy |
|
[Source] |
Facilitates tunneling HTTP communications through servers vulnerable to SSRF |
Ruby |
Free |
False |
SSRF Sheriff |
|
[Source] |
Genereate custom endpoint to test SSRF; support any HTTP method, content-specific responses, configurable secret token |
Go |
Free |
False |
SSRFmap |
|
[Source] |
Automatic SSRF fuzzer and exploitation tool |
Python |
Free |
False |
STEWS |
|
[Source] |
Security Testing and Enumeration of WebSockets; tool suite for security testing WebSockets: discover endpoints, fingerprint server, detect vulnerabilities |
Python |
Free |
False |
Surf |
|
[Source] |
Escalate SSRF vulnerabilities on modern cloud environments, enumerate reachable hosts |
Go |
Free |
False |
testssl.sh |
[Website] |
[Source] |
TLS/SSL scanner to find weak ciphers, protocols or flaws |
Shell |
Free |
False |
TIDoS Framework |
|
[Source] |
Comprehensive web-app audit framework |
Python |
Free |
False |
TLS map |
[Website] |
[Source] |
CLI & library for mapping TLS cipher algorithm names: IANA, OpenSSL, GnUTLS, NSS |
Ruby |
Free |
False |
toxssin |
|
[Source] |
XSS exploitation command-line interface and payload generator |
Python |
Free |
False |
tplmap |
|
[Source] |
SSTI and code injection detection and exploitation tool |
Python |
Free |
False |
Tracy |
|
[Source] |
Tool that help to manually find XSS |
Go |
Free |
False |
TrashCompactor |
|
[Source] |
Remove URLs with duplicate funcionality based on script resources included |
Go |
Free |
False |
Typo3Scan |
|
[Source] |
Enumerate Typo3 version and extensions |
Python |
Free |
False |
Uniscan |
|
[Source] |
RFI, LFi and RCE scanner |
Perl |
Free |
False |
V3n0M |
|
[Source] |
Web dork and vulnerability scanner |
Python |
Free |
False |
vaf |
|
[Source] |
Web directory and file scanner (wordlist bruteforce); but also a web fuzzer |
Nim |
Free |
False |
Vega |
[Website] |
[Source] |
Multi-platform web scanner and intercepting proxy |
Java |
Free |
False |
VOOKI |
[Website] |
|
Windows only web application and REST API vulnerability scanner |
|
Free |
False |
w3af |
[Website] |
[Source] |
Web application attack and audit framework, web-oriented security scanner |
Python |
Free |
False |
WAFNinja |
|
[Source] |
WAF bypassing tool |
Python |
Free |
False |
wapiti |
[Website] |
[Source] |
Web-oriented vulnerability scanner, can generates reports |
|
Free |
False |
WappaGo |
|
[Source] |
Web technologies detection; assemble different features from HTTPX, Naabu, GoWitness and Wappalyzer |
Go |
Free |
False |
WAScan |
|
[Source] |
Web application security scanner |
Python |
Free |
False |
webanalyze |
|
[Source] |
Port of Wappalyzer (uncovers technologies used on websites) to automate mass scanning |
Go |
Free |
False |
Webhook Tester |
[Website] |
[Source] |
HTTP request collector and inspector |
PHP |
Free |
True |
Weevely |
|
[Source] |
Web shell for post-exploitation working with a PHP agent |
Python |
Free |
False |
Wfuzz |
[Website] |
[Source] |
Web directory and file scanner (wordlist bruteforce); but also a web fuzzer |
Python |
Free |
False |
What CMS |
[Website] |
|
Service able to detect more than 430 CMS, find version used for some CMS, has an API for batch detection |
|
Free |
True |
WhatWeb |
[Website] |
[Source] |
Web scanner, recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices, also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more; more than 1800 plugins |
Ruby |
Free |
False |
wikto |
|
[Source] |
Nikto for Windows; web security scanner |
CSharp |
Free |
False |
WitnessMe |
|
[Source] |
Take screenshots of websites, provide some server header info, and identify default credentials if possible |
Python |
Free |
False |
WPScan |
[Website] |
[Source] |
WordPress CMS vulnerability scanner |
Ruby |
Free |
True |
wrapwrap |
[Website] |
[Source] |
Generates a php://filter chain that adds a prefix and a suffix to the contents of a file |
Python |
Free |
False |
WS-Attacker |
|
[Source] |
Modular framework for SOAP web services penetration testing |
Java |
Free |
False |
WSFuzzer |
[Website] |
[Source] |
Fuzzing penetration testing tool for testing HTTP SOAP based web services |
Python |
Free |
False |
wsrepl |
[Website] |
[Source] |
Interactive websocket REPL designed specifically for penetration testing |
Python |
Free |
False |
WSSAT |
[Website] |
[Source] |
Web Service Security Assessment Tool; WS, REST API, SOAP API dynamic scanner |
CSharp |
Free |
False |
x8 |
|
[Source] |
HTTP parameter discovery suite |
Rust |
Free |
False |
XCat |
[Website] |
[Source] |
Automate XPath injection/XXE attacks to retrieve documents |
Python |
Free |
False |
Xenotix |
[Website] |
[Source] |
XSS detection and exploit framework (Windows only) |
Python |
Free |
False |
xnLinkFinder |
|
[Source] |
Discover endpoints and potential parameters for a given target |
Python |
Free |
False |
Xray |
[Website] |
[Source] |
Web security scanner (XSS, SQLi, SSRF, XXE, etc.) |
Go |
Free |
False |
XSinator |
[Website] |
[Source] |
XS-Leak browser test suite |
JavaScript |
Free |
False |
XSpear |
|
[Source] |
XSS Scanner |
Ruby |
Free |
False |
XSRFProbe |
|
[Source] |
Advanced Cross Site Request Forgery (CSRF/XSRF) audit and exploitation toolkit |
Python |
Free |
False |
XSS hunter |
[Website] |
|
XSS probes host for finding blind XSS |
|
Free |
True |
XSS Hunter Express |
|
[Source] |
XSS probes host for finding blind XSS |
|
Free |
False |
XSS'OR |
[Website] |
[Source] |
Multi-purpose tool for XSS or JavaScript analysis |
JavaScript |
Free |
True |
XSS'OR 2 |
[Website] |
[Source] |
Multi-purpose tool for XSS or JavaScript analysis |
JavaScript |
Free |
True |
XSSCon |
|
[Source] |
XSS automatic scanner |
Python |
Free |
False |
XSSer |
[Website] |
[Source] |
XSS automatic scanner and exploiter |
Python |
Free |
False |
XSStrike |
|
[Source] |
XSS detection tool, parser, payload generator, fuzzing engine, crawler |
Python |
Free |
False |
XXEinjector |
|
[Source] |
Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods |
Ruby |
Free |
False |
xxeserv |
|
[Source] |
HTTP and FTP server for OOB XXE attacks |
Go |
Free |
False |
XXExploiter |
[Website] |
[Source] |
Generates XML payloads, and automatically starts a server to serve the needed DTD's or to do data exfiltration for XXE attacks |
JavaScript |
Free |
False |
xxxpwn |
|
[Source] |
XPath injection tool, designed for blind injection |
Python |
Free |
False |
xxxpwn_smart |
|
[Source] |
XPath injection tool, fork of xxxpwn adding further optimizations and tweaks, uses predictive text based on a dictionary of words/phrases vs frequencies of occurrence |
Python |
Free |
False |
YASUO |
|
[Source] |
Scans for vulnerable & exploitable 3rd-party web applications |
Ruby |
Free |
False |
Yoga |
[Website] |
[Source] |
Your OSINT Graphical Analyzer; project to help people understand different courses of action to take based upon the data |
JavaScript |
Free |
False |