Main Vulnerabilities:-

  1. Injection of SQL data
  2. Cross-Site Scripting (XSS)
  3. Injection of Commands
  4. Direct Object References That Aren’t Secure (IDOR)
  5. Forgery of Cross-Site Requests (CSRF)
  6. External Entity in XML (XXE), Deserialization that isn’t secure
  1. Uploading a File

8. Inclusion of Files

  1. Authentication Issues

Disclaimer: The intended use for the tool is strictly educational and should not be used for any other purposes.


Download Link:

This site is under maintenance,
some features might not work!!!