Saturday, July 20, 2019

Web Application Analysis

Web Applications Tools

Web Application Analysis

Home Web Application Analysis
Web Applications Tools
web hacking tools

Top 10 Best Web Hacking Tools

Here is the best web hacking tools that helps you in pen-testing and protecting the websites.
ua-tester

Ua-tester – A tool for User Agent WAF, IDS/IPS, Redirection testing

UA-tester is a tool to check whether a website provides different pages for different user agents like for mobile, desktop...
Sqlmap

SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms

Sqlmap is a database assessment tool which pentesters & security researchers can use to enumerate databases of various types. Sqlmap...
Whatweb

whatweb – Tool to Discover Security Vulnerabilities With Your Web Application

Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify...
sqlmap

SQLMAP – Introduction & Automation of SQLi

Basic Operation of SQLMAP & enumeration of Server through automatic SQL Injection. SQLMAP is a database pentesting tool used to automate SQL...

Burpsuite – Use Burp Intruder to Bruteforce Forms

Using Burp Intruder to Bruteforce passwords. Burpsuite is a collection of tools and plugins for any web application security testing bundled...
burpsuite

Burpsuite – A Beginner’s Guide For Web Application Security or Penetration Testing

Burpsuite is a collection of tools bundled into a single suite made for Web Application Security or Penetration testing. It's...

Must Need

MongoBuster

MongoBuster : Hunt Open MongoDB Instances

MongoBuster is a hunt open mongoDB instances. Following are the features that are associated with this. Worlds fastest and...
Munin

Munin – Online Hash Checker For Virustotal & Other Services

Munin is a online hash checker utility that retrieves valuable information from various online sources The current version of Munin queries the following services: Virustotal ...
Bug Bounty

What is Bug Bounty Program?

A bug bounty program, likewise called a vulnerability rewards program (VRP), is a publicly supporting activity that rewards people for finding and revealing programming...
JWT Tool : A Toolkit For Testing, Tweaking & Cracking JSON Web Tokens

JWT Tool : A Toolkit For Testing, Tweaking & Cracking JSON...

JWT Tool(jwt_tool.py) is a toolkit for validating, forging and cracking JWTs (JSON Web Tokens). Its functionality includes: Checking the...
PCILeech

PCILeech – Direct Memory Access (DMA) Attack Software

PCILeech uses PCIe hardware devices to read and write from the target system memory. This is achieved by using DMA over PCIe. No drivers...
lbd

lbd – Tool to Detect Whether a Domain has Load Balancing...

Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can be in any form....
Steal NTLM Hashes

Bad-PDF To Steal NTLM Hashes From Windows Machines

Bad-PDF make pernicious PDF to steal NTLM Hashes from windows machines, it use defenselessness revealed by checkpoint group to make the malicious PDF record....

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout