Exploit vulnerabilities on Web Applications.
35 listed tools Last update on 2025-06-12
Recon: Information gathering stage, where attackers gather as much information as possible about the target.
Weaponization: Crafting of tools or payloads to exploit vulnerabilities.
Delivery: The transmission of the weaponized payload to the target.
Exploitation: Exploiting a vulnerability to gain access to the target system.
Installation: Establishing a foothold on the target system.
Command & Control (C2): Setting up channels for communication with the compromised system.
Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.
Open-source
Command and control server for delivering exploits
Commercial
An integrated platform for web-application pentesting (Free edition available)
Open-source
Brute-force over directories and web application server tool with hidden directory search
Open-source
Web server vuln scanner that performs comprehensive tests to identify dangerous files, outdated server software, and misconfigurations
Open-source
Audit for and automate injection attacks, exploit configuration weaknesses, and clone data
Open-source
Scriptable HTTP intercepting proxy and fuzzer for web applications
Free
Free tool for analyzing HTTP response headers to assess web application security posture and recommend improvements