(Page 2 of 9)   < Prev  1 2 3 4 5 6 7  Next >

Category: Auditing » Network » Web

Grendel-Scan
Added 2008-08-24
by David Byrne
Grendel-Scan is an open source web application security tool. It has a number of automated testing modules for finding common vulnerabilities such as SQL injection, cross-site scripting, or session fixation. There are also a number of features to aid in manual application penetration testing, such as a intercepting proxy.

Exploit-Me
Added 2007-11-27
by Security Compass
Exploit-Me is a set of Firefox plugins to test for reflected Cross-Site Scripting and SQL Injection vulnerabilities in web applications. The tools are designed to be lightweight, extensible and easy to use.

XSS Scanner
Added 2007-06-25
by d3hydr8
XSS Scanner that can find hosts using a google query or search one site. If XSS is found it attempts to collect email addresses to further your attack or warn the target of the flaw. When the scan is complete it will print out the XSS's found and or write to file, it will find false positives so manually check before getting to excited. It also has verbose mode and you can change the alert pop-up message, check options!!

N-Stalker Web Application Security Scanner 2006
Added 2006-09-13
by N-Stalker
N-Stalker Free Edition allows for quick security assessment of Web Applications under the perspective of Infrastructure and Deployment phases. It scans for more than 18,000 vulnerabilities, crawl your web application, discover hidden directories/files and look for backup files.

Collapse Web Application Scanner
Added 2006-09-05
by Syhunt Security Team
Collapse, a free tool from Syhunt, allows web administrators to perform aggressive and comprehensive scans of an organization's web server to isolate vulnerabilities and identify security holes. The Collapse scanner requires basic inputs such as host names and port numbers to scan a complete web site and test all the web applications for security vulnerabilities. This new version includes an improved GUI, new web application security checks and many other additional enhancements.

halberd
Added 2006-08-17
by Juan M. Bello Rivas
halberd discovers HTTP load balancers. It is useful for testing load balancer configurations and for web application auditing purposes.

Chorizo!
Added 2006-07-18
by Mayflower GmbH
Chorizo! is a web app security scanner especially for PHP based applications. It's an application service (all data encrypted on the server, no one can see the results except the users) that is able to detect SQL injections, AJAX bugs, code inclusions/executions, session fixations, PHP vulnerabilities and so on. It will also be available as an appliance version for testing non-public websites.

Collapse Web Application Scanner
Added 2006-06-20
by Syhunt Security Team
Collapse, a free tool from Syhunt, allows web administrators to perform aggressive and comprehensive scans of an organization's web server to isolate vulnerabilities and identify security holes. The Collapse scanner requires basic inputs such as host names and port numbers to scan a complete web site and test all the web applications for security vulnerabilities. 1100 new vulnerabilities were added in the last months of 2006

Belkasoft Forensic IM Extractor
Added 2006-06-12
by Belkasoft
This tool for e-crime/forensic professionals eases their work on analysing Internet Messengers histories. No password required. Supports various IMs: ICQ versions 99a up to ICQ5, MSN Messenger, Yahoo! Messenger, &RQ, Miranda. Supports deep ICQ analysis using different methods (with and without usage of index file) that allows user to extract even deleted and overwritten messages. The latter ability is indispensable for e-crime professionals. A number of different options available like filtering messages by time, sent/received type, user; ability to convert history to ICQ5 format; multibyte codepages are supported. More info at http://belkasoft.com.

JAAScois Anti-WebInjection
Added 2006-05-20
by http://www.jaascois.com
JAAScois Anti-WebInjection will scan all website for analysis any Injection exploits - SQL Injection Exploits - Remote File Inclusion Exploits - Cross-Site Scripting - XSS Exploits - Error Pages 404 , 500 etc ... - Password & Upload Pages By JAAScois (C) 2006

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus