<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Zer0+c00l</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Zer0+c00l"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Zer0_c00l"/>
		<updated>2026-04-05T18:44:43Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=17138</id>
		<title>Appendix A: Testing Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=17138"/>
				<updated>2007-03-11T15:56:46Z</updated>
		
		<summary type="html">&lt;p&gt;Zer0 c00l: /* Commercial Black Box Testing tools */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
==Open Source Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
* '''OWASP WebScarab''' - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* '''OWASP CAL9000''' - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br&amp;gt;&lt;br /&gt;
** CAL9000 is a collection of browser-based tools that enable more effective and efficient manual testing efforts. Includes an XSS Attack Library, Character Encoder/Decoder, HTTP Request Generator and Response Evaluator, Testing Checklist, Automated Attack Editor and much more. &lt;br /&gt;
&lt;br /&gt;
* '''OWASP Pantera''' - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* SPIKE - http://www.immunitysec.com&lt;br /&gt;
* Paros - http://www.parosproxy.org&lt;br /&gt;
* Burp Proxy - http://www.portswigger.net&lt;br /&gt;
* Achilles Proxy - http://www.mavensecurity.com/achilles&lt;br /&gt;
* Odysseus Proxy - http://www.wastelands.gen.nz/odysseus/&lt;br /&gt;
* Webstretch Proxy - http://sourceforge.net/projects/webstretch&amp;lt;br&amp;gt;&lt;br /&gt;
* Firefox LiveHTTPHeaders, Tamper Data and Developer Tools- http://www.mozdev.org&lt;br /&gt;
* Sensepost Wikto (Google cached fault-finding) - http://www.sensepost.com/research/wikto/index2.html&lt;br /&gt;
&lt;br /&gt;
=== Testing for specific vulnerabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Testing AJAX '''&amp;lt;br&amp;gt;&lt;br /&gt;
* OWASP SPRAJAX - http://www.owasp.org/index.php/Category:OWASP_Sprajax_Project&lt;br /&gt;
'''Testing for SQL Injection '''&amp;lt;br&amp;gt;&lt;br /&gt;
* OWASP SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&lt;br /&gt;
* Multiple DBMS Sql Injection tool - [SQL Power Injector]&lt;br /&gt;
* MySql Blind Injection Bruteforcing, Reversing.org - [sqlbftools]&lt;br /&gt;
* Antonio Parata: Dump Files by sql inference on Mysql - [SqlDumper]&lt;br /&gt;
* Sqlninja: a SQL Server Injection&amp;amp;Takeover Tool - http://sqlninja.sourceforge.net &lt;br /&gt;
* Bernardo Damele and Daniele Bellucci: sqlmap, a blind SQL injection tool - http://sqlmap.sourceforge.net/&lt;br /&gt;
* Absinthe 1.1 (formerly SQLSqueal) - http://www.0x90.org/releases/absinthe/&amp;lt;br&amp;gt;&lt;br /&gt;
* SQLInjector - http://www.databasesecurity.com/sql-injector.htm&lt;br /&gt;
* bsqlbf-1.2-th - http://www.514.es &amp;lt;br&amp;gt;&lt;br /&gt;
'''Testing Oracle'''&lt;br /&gt;
* TNS Listener tool (Perl) - http://www.jammed.com/%7Ejwa/hacks/security/tnscmd/tnscmd-doc.html&lt;br /&gt;
* Toad for Oracle - http://www.quest.com/toad &lt;br /&gt;
'''Testing SSL '''&amp;lt;br&amp;gt;&lt;br /&gt;
* Foundstone SSL Digger - http://www.foundstone.com/resources/proddesc/ssldigger.htm&lt;br /&gt;
'''Testing for Brute Force Password'''&lt;br /&gt;
* THC Hydra - http://www.thc.org/thc-hydra/&lt;br /&gt;
* John the Ripper - http://www.openwall.com/john/&lt;br /&gt;
* Brutus - http://www.hoobie.net/brutus/ &lt;br /&gt;
'''Testing for HTTP Methods'''&lt;br /&gt;
* NetCat - http://www.vulnwatch.org/netcat&lt;br /&gt;
'''Testing Buffer Overflow'''&lt;br /&gt;
*  OllyDbg: &amp;quot;A windows based debugger used for analyzing buffer overflow vulnerabilities&amp;quot; - http://www.ollydbg.de&lt;br /&gt;
* Spike, A fuzzer framework that can be used to explore vulnerabilities and perform length testing - http://www.immunitysec.com/downloads/SPIKE2.9.tgz&lt;br /&gt;
* Brute Force Binary Tester (BFB), A proactive binary checker - http://bfbtester.sourceforge.net/&lt;br /&gt;
* Metasploit, A rapid exploit development and Testing frame work - http://www.metasploit.com/projects/Framework/ &lt;br /&gt;
'''Fuzzer'''&amp;lt;br&amp;gt;&lt;br /&gt;
* OWASP WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&lt;br /&gt;
'''Googling'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Foundstone Sitedigger (Google cached fault-finding) - http://www.foundstone.com/resources/proddesc/sitedigger.htm&lt;br /&gt;
&lt;br /&gt;
==Commercial Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
* Typhon - http://www.ngssoftware.com/products/internet-security/ngs-typhon.php&lt;br /&gt;
* NGSSQuirreL - http://www.ngssoftware.com/products/database-security/&lt;br /&gt;
* Watchfire AppScan - http://www.watchfire.com&lt;br /&gt;
* Cenzic Hailstorm - http://www.cenzic.com/products_services/cenzic_hailstorm.php&amp;lt;br&amp;gt;&lt;br /&gt;
* SPI Dynamics WebInspect - http://www.spidynamics.com&lt;br /&gt;
* Burp Intruder - http://portswigger.net/intruder&amp;lt;br&amp;gt;&lt;br /&gt;
* Acunetix Web Vulnerability Scanner - http://www.acunetix.com/&amp;lt;br&amp;gt;&lt;br /&gt;
* ScanDo - http://www.kavado.com&lt;br /&gt;
* WebSleuth - http://www.sandsprite.com&lt;br /&gt;
* NT Objectives NTOSpider - http://www.ntobjectives.com/products/ntospider.php&amp;lt;br&amp;gt;&lt;br /&gt;
* Fortify Pen Testing Team Tool - http://www.fortifysoftware.com/products/tester&amp;lt;br&amp;gt;&lt;br /&gt;
* Sandsprite Web Sleuth - http://sandsprite.com/Sleuth/&amp;lt;br&amp;gt;&lt;br /&gt;
* MaxPatrol Security Scanner - http://www.maxpatrol.com/&amp;lt;br&amp;gt;&lt;br /&gt;
* Ecyware GreenBlue Inspector - http://www.ecyware.com/&amp;lt;br&amp;gt;&lt;br /&gt;
* Parasoft WebKing (more QA-type tool)&amp;lt;br&amp;gt;&lt;br /&gt;
* MatriXay - http://www.dbappsecurity.com/&amp;lt;br&amp;gt;&lt;br /&gt;
* N-Stalker Web Application Security Scanner - http://www.nstalker.com/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Source Code Analyzers==&lt;br /&gt;
&lt;br /&gt;
===Open Source / Freeware===&lt;br /&gt;
&lt;br /&gt;
* http://www.securesoftware.com&lt;br /&gt;
* FlawFinder - http://www.dwheeler.com/flawfinder&lt;br /&gt;
* Microsoft’s FXCop - http://www.gotdotnet.com/team/fxcop&lt;br /&gt;
* Split - http://splint.org&lt;br /&gt;
* Boon - http://www.cs.berkeley.edu/~daw/boon&lt;br /&gt;
* Pscan - http://www.striker.ottawa.on.ca/~aland/pscan&lt;br /&gt;
&lt;br /&gt;
===Commercial ===&lt;br /&gt;
&lt;br /&gt;
* Fortify - http://www.fortifysoftware.com&lt;br /&gt;
* Ounce labs Prexis - http://www.ouncelabs.com&lt;br /&gt;
* GrammaTech - http://www.grammatech.com&lt;br /&gt;
* ParaSoft - http://www.parasoft.com&lt;br /&gt;
* ITS4 - http://www.cigital.com/its4&lt;br /&gt;
* CodeWizard - http://www.parasoft.com/products/wizard&lt;br /&gt;
&lt;br /&gt;
==Acceptance Testing Tools==&lt;br /&gt;
Acceptance testing tools are used validate the functionality of web applications.  Some follow a scripted approach and typically make use of a Unit Testing framework to construct test suites and test cases.  Most, if not all, can be adapted to perform security specific tests in addition to functional tests.&lt;br /&gt;
&lt;br /&gt;
===Open Source Tools===&lt;br /&gt;
&lt;br /&gt;
* WATIR - http://wtr.rubyforge.org/ - A Ruby based web testing framework that provides an interface into Internet Explorer.  Windows only.&lt;br /&gt;
* HtmlUnit - http://htmlunit.sourceforge.net/ - A Java and JUnit based framework that uses the Apache HttpClient as the transport.  Very robust and configurable and is used as the engine for a number of other testing tools.&lt;br /&gt;
* jWebUnit - http://jwebunit.sourceforge.net/ - A Java based meta-framework that uses htmlunit or selenium as the testing engine.&lt;br /&gt;
* Canoo Webtest - http://webtest.canoo.com/ - An XML based testing tool that provides a facade on top of htmlunit.  No coding is necessary as the tests are completely specified in XML.  There is the option of scripting some elements in Groovy if XML does not suffice.  Very actively maintained.&lt;br /&gt;
* HttpUnit - http://httpunit.sourceforge.net/ - One of the first web testing frameworks, suffers from using the native JDK provided HTTP transport, which can be a bit limiting for security testing.&lt;br /&gt;
* Watij - http://watij.com - A Java implementation of WATIR.  Windows only because it uses IE for it's tests (Mozilla integration is in the works).&lt;br /&gt;
* Solex - http://solex.sourceforge.net/ - An Eclipse plugin that provides a graphical tool to record HTTP sessions and make assertions based on the results.&lt;br /&gt;
* Selenium - http://www.openqa.org/selenium/ - JavaScript based testing framework, cross-platform and provides a GUI for creating tests.  Mature and popular tool, but the use of JavaScript could hamper certain security tests.&lt;br /&gt;
&lt;br /&gt;
==Other Tools==&lt;br /&gt;
&lt;br /&gt;
===Runtime Analysis===&lt;br /&gt;
&lt;br /&gt;
*  Rational PurifyPlus - http://www-306.ibm.com/software/awdtools&lt;br /&gt;
&lt;br /&gt;
===Binary Analysis===&lt;br /&gt;
&lt;br /&gt;
* BugScam - http://sourceforge.net/projects/bugscam&lt;br /&gt;
* BugScan - http://www.hbgary.com&lt;br /&gt;
&lt;br /&gt;
===Requirements Management===&lt;br /&gt;
&lt;br /&gt;
* Rational Requisite Pro - http://www-306.ibm.com/software/awdtools/reqpro&lt;br /&gt;
&lt;br /&gt;
'''Site Mirroring'''&lt;br /&gt;
* wget - http://www.gnu.org/software/wget, http://www.interlog.com/~tcharron/wgetwin.html&lt;br /&gt;
* curl - http://curl.haxx.se &lt;br /&gt;
* Sam Spade - http://www.samspade.org&lt;br /&gt;
* Xenu - http://home.snafu.de/tilman/xenulink.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Zer0 c00l</name></author>	</entry>

	</feed>