CybersecurityWebsite scanner for security threats
Blind Elephant Scanner
The Use of the Blind elephant is to fingerprint versions of known CMS, Including the most common CMS applications, forums, and phpMyadmin. It is a New Web Application Fingerprinting Tool. The Blind Elephant Web Application Finger printer attempts to discover the version of a (known) web application by comparing static files at known locations against pre computed hashes for versions of those files in all available releases. The technique is fast, low-bandwidth, non-invasive, generic, and highly automatable.
WhatWeb Web Site Test
WhatWeb looks at the web server headers and source html from a website to determine what technologies are going to use. This is suitable for scanning public websites and this is more aggressive in penetration tests.
WordPress Security Scan
Word Press plugins, themes and other installation details can be assessed with this scanner. WP Security Scan checks your Word Press website/blog for security vulnerabilities and suggests corrective actions such as: Passwords, File permissions, Database security, Version hiding, Word Press admin protection/security, Removes WP Generator META tag from core code etc. WP Security plugin is a comprehensive security tool that helps you secure your Word Press installation and suggests corrective measures for: securing file permissions, security of the database, version hiding, Word Press admin protection and lots more.
Joomla Security Scan
It is Used as online scanner to detect security problems with a Joomla installation. Joomla Security Scanner. Joomla Security Scanner Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla websites. It will help web developers and web masters to identify possible security weaknesses on their deployed Joomla Sites.
Drupal Security Scan (Python Script)
Drupal security scan to find a variety of security related information around a Drupal installation.
- PHP 5.x, My Sql 5.x, Seagull PHP
To build a Website the users can subscribe to pay ( monthly, Quarterly, or Yearly and scan their websites for security threats).
Nmap port Scanner
Ability to scan all ports and complete net blocks. . namp is network exploration tool and security / port scanner. It is flexible in specifying targets. User can scan entire network or selected host or single server Nmap is also useful to test your firewall rules.
OpenVas Vulnerability Scanner
OpenVas is a open source vulnerability scanner that will perform thousands of checks against a system looking for known security vulnerabilities . Open Vulnerability Assessment System (OpenVAS) has become the Open Source Network Vulnerability Scanner. OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. Online security vulnerability testing using OpenVAS scanner. Test Internet connected servers and web sites now with this powerful open source security tool.
Nikto Web Scanner
Vulnerable web scripts, configuration errors, and web server vulnerabilities can all be detected with the online version of the Nikto Web Scanner. Nikto Web Scanner is a Web server scanner that tests Web servers for dangerous files/CGIs, outdated server software and other problems. Nikto performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs. Nikto is a tool that it has been written in Perl and it can perform tests against web servers in order to identify potential vulnerabilities.
SQL Injection Test
Sqlmap is to test for SQL injection on applications. SQL injections are most dangerous web attacks on web applications. Testers need to test web applications for all web vulnerabilities. sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.