|
|
Thread Tools | Display Modes |
#1
|
|||
|
|||
Get -WebCruiser Web Vulnerability Scanner Personal + Enterprise Edition Legit License
janusec.com
Web Vulnerability Scanner, an effective web penetration testing tool that will aid you in auditing your website. WebCruiser supports scanning website as well as POC (Proof of concept) for SQL Injection, Cross Site Scripting, Local File Inclusion, Remote File Inclusion, Redirect and other Web vulnerabilities. http://www.janusec.com/wp-content/uploads/2014/12/header.png WebCruiser Web Vulnerability Scanner, an effective and powerful web penetration testing tool! http://www.janusec.com/images/wvs.png WebCruiser Web Vulnerability Scanner, an effective and powerful web penetration testing tool that will aid you in auditing your website! It can support scanning website as well as POC (Proof of concept) for web vulnerabilities: SQL Injection, Cross Site Scripting, Local File Inclusion, Remote File Inclusion, Redirect, Obsolete Backup etc. The most typical feature of WebCruiser comparing with other Web Vulnerability Scanners is that WebCruiser Web Vulnerability Scanner focuses on high risk vulnerabilities, and WebCruiser can scan a designated vulnerability type, or a designated URL, or a designated page separately, while the others usually will not. WebCruiser Web Vulnerability Scanner Test Report (0.7MB) http://www.janusec.com/download/WebCruiser_Web_Vulnerability_Scanner_Test_Report.pdf WebCruiser Web Vulnerability Scanner V3.5.3 new features: Optimization for Content-Type: multipart/form-data. V3.5 new features: SQL Injection for PostgreSQL & SQLite added. WebCruiser Web Vulnerability Scanner Personal Edition 3.5.3 Official Price US$ 49.00 WebCruiser Web Vulnerability Scanner Enterprise Edition 3.5.3 official Price US$ 890.00 WebCruiser Web Vulnerability Scanner for Windows WebCruiser Web Vulnerability Scanner, an effective and powerful web penetration testing tool that will aid you in auditing your website! It has a Crawler and a Vulnerability Scanner (SQL Injection, Cross Site Scripting etc.). It can support scanning website as well as POC (Proof of concept) for web vulnerabilities: SQL Injection, Cross Site Scripting, Local File Inclusion, Remote File Inclusion, Redirect etc. The most typical feature of WebCruiser comparing with other Web Vulnerability Scanners is that WebCruiser Web Vulnerability Scanner focuses on high risk vulnerabilities, and WebCruiser can scan a designated vulnerability type, or a designated URL, or a designated page separately, while the others usually will not. V3.5.3 new features: Optimization for Content-Type: multipart/form-data. V3.5.2 new features: User-Agent/Referer SQL Injection for MySQL, and new test cases added. V3.5.1 new features: Time-Based SQL Injection POC for MySQL. V3.5.0 new features: SQL Injection for PostgreSQL & SQLite added. V3.4.0 new features: Scan Obsolete Backup. V3.3.0 new features: Optimization of SQL Injection Engine. V3.2.1 new features: Scan Log available, and bug fix. V3.1.0 new features: Scan LFI( Local File Inclusion), RFI( Remote File Inclusion), Redirect etc. Test report available : WebCruiser Web Vulnerability Scanner Test Report (0.7MB) Key Features: * Crawler(Site Directories and Files). * Vulnerability Scanner: SQL Injection, Cross Site Scripting, LFI, RFI, Redirect, Backup etc. * WAVSEP v1.5 SQL Injection & XSS test cases 100% covered. * SQL Injection POC Tool: GET/Post/Cookie Injection POC(Proof of Concept). * SQL Injection for SQLServer, MySQL, Oracle, DB2, Access, PostgreSQL, SQLite. * POC Tool for XSS, LFI, RFI, Redirect etc. * Resend & brute force Tool. * Cookie Tool. System Requirement: Windows 7/8, or Windows with .Net Framework 2.0 or 3.5 , IE8+ Editions: Personal : for security professionals, masters of individual websites etc., non-commercial usage, No function limit. Enterprise: for enterprises, institution, or commercial organizations/usage, No function limit. Personal edition and enterprise edition are all full function editions. Products Page: http://www.janusec.com/downloads/ Documentation http://www.janusec.com/documentation/ Direct Official Download Link: WebCruiser Web Vulnerability Scanner Personal Edition 3.5.3 PHP Code:
PHP Code:
Username: ExeTools License: CA86-F42F-70EB-82CA Username: Spiderz_Soft License: 7937-BA14-2D5E-7EA3 Please let me know if you get any issue in activation by using above license. Regards Spiderz Last edited by Spiderz_Soft; 10-28-2016 at 19:00. |
The Following 14 Users Say Thank You to Spiderz_Soft For This Useful Post: | ||
abhi93696 (04-13-2017), alekine322 (11-05-2016), bolo2002 (10-28-2016), chants (11-04-2016), Elesty (02-06-2017), evlncrn8 (10-28-2016), foosaa (11-20-2016), gsaralji (10-29-2016), niculaita (10-28-2016), ontryit (10-29-2016), ph03n1x (06-24-2017), TechLord (10-29-2016), user_hidden (10-28-2016) |
#2
|
||||
|
||||
Checked this out since I do some web development and sadly I can't say this is that great of a product. It has a lot of false-positives on error pages that are valid on a site. Used it on two private sites and one public one I work on and on all three it found a ton of false-positives that were not actual issues.
Nice tool for testing out generic SQL injection methods, but in terms of more in depth analysis I wouldn't recommend it. |
#3
|
|||
|
|||
You can play with this onto url's @
http://www.vulnweb.com/ legal..
__________________
I like this forum! |
The Following User Says Thank You to bolo2002 For This Useful Post: | ||
Spiderz_Soft (10-30-2016) |
#4
|
|||
|
|||
Serials are nice, but aren't keygens better?
Code:
#!/usr/bin/env python2 # Janusec.WebCruiser.3.5.3.Keygen # Author: SmilingWolf # Thanks to: whoever leaked a valid key # so that the MagicValue could be found import sys, binascii, struct from Crypto.Hash import SHA512 MagicValue = 0x7FA1447820DA2C6C def GetHash(Data): Hash = SHA512.new() Hash.update(Data) HashBytes = binascii.hexlify(Hash.digest()) FinalHash = '' for Elem in xrange(0, len(HashBytes), 8): FinalHash = FinalHash + HashBytes[Elem] return binascii.unhexlify(FinalHash) if len(sys.argv) < 2: print 'Usage:' print '%s username' % sys.argv[0] sys.exit(0) UserName = sys.argv[1] UInt64Hash = struct.unpack('>Q', GetHash(UserName))[0] UInt64Serial = (UInt64Hash + MagicValue) % 0x10000000000000000 Serial = binascii.hexlify(struct.pack('>Q', UInt64Serial)).upper() Serial = '%s-%s-%s-%s' % (Serial[0:4], Serial[4:8], Serial[8:12], Serial[12:16]) print UserName print Serial Last edited by SmilingWolf; 11-03-2016 at 21:57. |
Tags |
webcruiser |
|
|