CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Events
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Tool

WebScarab

Reading Time: 2 mins read
in Software, Tool

WebScarab is designed to be a tool for anyone who needs to expose the workings of an HTTP(S) based application, whether to allow the developer to debug otherwise difficult problems, or to allow a security specialist to identify vulnerabilities in the way that the application has been designed or implemented.

Almost nothing of the original WebScarab remains in the current code base. Although the spider code that WebSphinx/WebScarab was based on was mature and well-tested, it did not fit in with my view of how such a tool should operate. Rather than rip out 99% of WebSphinx, I chose to implement a trivial spider in its place. The original WebScarab/WebSphinx spider code is still available from SourceForge, for anyone who is interested.

This page is not the official WebScarab page. A quickstart guide is available here, and some user documentation is available here. This user documentation is the same as that available via the built-in javahelp, within WebScarab.

WebScarab Homepage | Kali WebScarab Repo

  • Author: Rogan Dawes
  • License: GPLv2

Tools included in the webscarab package

webscarab – Web application review tool

WebScarab is a Web Application Review tool.

VISIT SOURCE

Tags: PenTestingtool of the dayWebscarab
ADVERTISEMENT

Related Posts

Lexar LJDF35-128BNL Jumpdrive Fingerprint

Lexar LJDF35-128BNL Jumpdrive Fingerprint

January 24, 2023
YubiKey Bio Series – FIDO Edition

YubiKey Bio Series – FIDO Edition

January 24, 2023
Kaa IoT

Kaa IoT

December 29, 2022
ThingsBoard

ThingsBoard

December 29, 2022

More Articles

Document

Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats

May 10, 2022
Alerts

Dell security advisory (AV22-690)

December 12, 2022

Dell security advisory (AV22-565)

October 11, 2022
Document

Thinking like a Hunter: Implementing a Threat Hunting Program

June 29, 2022
Entertainment

Meet the Robinsons (Walt Disney)

January 27, 2022
Alerts

Eaton security advisory (AV22-257)

May 10, 2022
Quotes

“In my experience, KRIs deliver substantially…”

June 3, 2022

Mercedes-Benz USA accidentally puts out data from nearly 1,000 customers

June 29, 2021
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.