Repeater: With the help of this tool you can just test an application manually.Comparer: This tool is used for performing the comparison (a difference or Visual “diff”) between any type of items of the data.It is also capable of recognizing several encoding formats intelligently using different types of Heuristic techniques. It is also used for the transformation of the raw data in the form of various hashed and encoded forms. Decoder: This tool transforms the transforms all of the encoded data into a canonical form.It can be used as a conjunction with manual mapping techniques to ultimately speed up the process of mapping the functions and applications of the content. Spider: This tool works just like a spider because of its electronic crawling web applications.Scanner: This tool is a complete security scanner for web applications it is used for performing automated vulnerability tests and scans of the web applications.This tool can quickly detect and perform the test against SQL Injection, Cross-Site Scripting, and all others. This tool also gives you a complete configurable algorithm that can be used to generate any kind of malicious HTTP request. Intruder: Intruder can perform any type of automated attack on Web Applications.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |