Websecurify

Regular updates about Websecurify free and premium website scanners, proxies, fuzzers and insight knowledge about SQL Injection, Cross-site Scripting and other vulnerabilities

Why Websecurify?

You may ask yourself What is so different about Websecurify Security Testing Framework? I am planning to get in a bit more detail on the GNUCITIZEN blog on this topic. However, here and now I would like to list some the key features:

  1. JavaScript - Websecurify Security Testing Framework is the first tool of its kind to be written entirely in JavaScript using only standard technologies adopted by the leading browsers.
  2. Multiple Environments - The core technology can run in normal browsers, xulrunner, xpcshell (command line), inside Java or as part of a custom V8 (Chrome's JavaScript Engine) build. The core is written with extensibility in mind so that more environments can be supported without changing even a single line of code.
  3. Multi-platform - The tool is available and successfully runs on Windows, Mac OS, Linux and other operating systems.
  4. Automatic Updates - Every single piece of the tool is subjected to automatic updates. This means that newer and more advanced versions of the tool can be shipped to your front door without you lifting your finger. This however is completely optional. The automatic update can be turned off if needed.
  5. Extensions - Because the tool comes wrapped in xulrunner by default (keep in mind that we can support any other JavaScript environment) we benefit from all cool features that Firefox has, such as extensions. Extensions are easy to write and maintain and can customize every single aspect of the tool and there are already tons of resources and documentation, including books and what not, out there to teach you exactly how to do that. We will be providing documentation as well.

And these are just a few of the good features we support by default. Of course, there is always room for improvement and therefore we will keep working on the areas that require our attention.

Comments Powered ByDisqus