Web vulnerability scanners
I'll only consider free or "semi"-free tools.
Last updated
I'll only consider free or "semi"-free tools.
Last updated
is a free and open-source web security scanning tool and testing platform designed to evaluate the security of web applications. It assists in the identification and validation of vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), inadvertent data disclosure, and more. Vega is built in Java, offers a user-friendly GUI, and is compatible with Linux, OS X, and Windows.
Access the "Scan" option in the menu bar and choose "Start New Scan" from the available selections.
The "Select a Scan Target" window will appear on the screen. Make sure the "Enter a base URI for scan" radio button is selected within the "Scan Target" section.
In the "Enter a base URI for scan" field, input the target URL as follows: "http://<Target IP>:<PORT><path>"
The "Select Modules" wizard will open. Double-click on both checkboxes (Injection Modules and Response Processing Modules) to select all available options.
In the "Authentication Options" wizard, maintain the default settings and click "Next."
In the "Parameters" wizard, keep the settings at their default values and click "Finish" to commence the scan.
A "Follow Redirect?" pop-up will appear; click "Yes" to proceed.
Vega will initiate the scan of the target website for vulnerabilities. Keep an eye on the "Scanner Progress" bar and wait for it to complete.
Once the scan is finished, the identified vulnerabilities will be listed under "Scan Alert Summary."
On the left-hand side, under "Scan Alerts," expand the nodes to explore the complete results of the vulnerability scan. Choose any of the discovered vulnerabilities to display details on the corresponding page, much like what's shown in the dashboard section in the provided screenshot.
is a free software command-line web vulnerability scanner.
It is available in Kali Linux.
To scan a WordPress website wpscan --url <Target URL>
.
This command initiates a scan with default settings, striking a balance between speed and accuracy. It checks plugins passively and actively determines their versions. Additionally, it examines potential configuration backup files and other noteworthy findings.
For a more discreet or stealthy approach, you can utilize wpscan --stealthy --url <Target URL>
. In this mode, when you employ the --enumerate
option, remember to adjust the --plugins-detection
setting as the default is 'passive'. This allows you to tailor the scan to your specific needs while keeping it less conspicuous.
Up to 25 API requests per day are given free of charge, that should be suitable to scan most WordPress websites at least once per day. When the daily 25 API requests are exhausted, WPScan will continue to work as normal but without any vulnerability data."
To use API Token: wpscan --api-token [API Token] --url<Target URL>
Default command: python3 pwnxss.py -u <Target URL>
The PwnXSS tool starts scanning and displays the identified vulnerable website links.
To verify copy paste the link into a browser.
is a scanning tool specifically designed for WordPress websites.
Full user documentation can be found here;
"WPScan CLI tool uses the to retrieve WordPress vulnerability data in real time. For WPScan to retrieve the vulnerability data an API token must be supplied via the --api-token
option, or via a configuration file. An API token can be obtained by registering an account on .
is an open-source XSS scanner that is used to detect cross-site scripting (XSS) vulnerabilities in websites. It is a multiprocessing and customizable tool written in Python language.