
Cyber Web Tools
777 users
Developer: Cyber Web
Version: 1.0.0.11
Updated: January 28, 2018

Available in the
Chrome Web Store
Chrome Web Store
Install & Try Now!

National Enquirer Magazine 20 November 2023 Matthew Perry Didn't Have

NSI TOP-M-D - Medium Ceramic Wire Connector Pack of 15

Google - Nest Protect 2nd Generation (Battery) Smart Smoke/Carbon Monoxide Alarm - White

Valve Steam Deck 64 GB

Wordle Christmas Card | Wordle Card | Wordle | Quirky Cards | Christmas Card | For Her | For Him

Colorado Buffaloes It's a New Era + Folsom Field 100th Anniversary Limited Edition Exclusive Football | By Nikco Sports
01. Snapshot
It takes a snapshot of the active web page. It provides two options by which you can either capture full screen web page or capture portion of a web page by selecting the required portion.
02. Estimation
It estimate the input fields with details of the active web page and provides filtration on it. These input fields further categories in form wise. Input details are Id, name, tag name, type, value.
03. OWASP
It include tools by which you can perform security testing of a web application. Some of testing tools are Cross Site Request Forgery, Http Only, Cookie Editor, Web Cache Viewer, Session Timeout.
04. Proxy Setting
It configure the proxy setting of the browser. You can use the system's proxy settings or configure proxy settings manually. Changing proxy settings has never been so convenient and reliable.
05. Web Streaming
It observe and analyze web request traffic. You can see the header and body of request generated by browser. There is no need to integrate any software to analyze web request traffic.
06. Web Scanner
It scan web applications, normally from the outside, to look for security vulnerabilities. It can easily detect most common vulnerabilities. It performs scans and tells where the vulnerability exists.
It takes a snapshot of the active web page. It provides two options by which you can either capture full screen web page or capture portion of a web page by selecting the required portion.
02. Estimation
It estimate the input fields with details of the active web page and provides filtration on it. These input fields further categories in form wise. Input details are Id, name, tag name, type, value.
03. OWASP
It include tools by which you can perform security testing of a web application. Some of testing tools are Cross Site Request Forgery, Http Only, Cookie Editor, Web Cache Viewer, Session Timeout.
04. Proxy Setting
It configure the proxy setting of the browser. You can use the system's proxy settings or configure proxy settings manually. Changing proxy settings has never been so convenient and reliable.
05. Web Streaming
It observe and analyze web request traffic. You can see the header and body of request generated by browser. There is no need to integrate any software to analyze web request traffic.
06. Web Scanner
It scan web applications, normally from the outside, to look for security vulnerabilities. It can easily detect most common vulnerabilities. It performs scans and tells where the vulnerability exists.
Related

Hackers toolkit
3,000+

Vulners Web Scanner
9,000+

Admin tools
1,000+

Evil Console
143

Input hidden Monitor
273

OWASP Penetration Testing Kit
20,000+

Bishop Vulnerability Scanner
2,000+

beABot
79

CounterXSS
402

YesWeHack VDP Finder
1,000+

Investigate with Lacework
197

Plugin Vulnerabilities
412

should-i-trust
176

Tracy
568

Display Access Keys
280

Breakbot
266

Scripter debugger extension
164

LiveScriptConsole
172

h4ck3r
464

Hack-Tools
30,000+

Dev Playground
256

OSIRIS: OSINT Reputation Intelligent Search
1,000+

HackBar
80,000+

IP, DNS & Security Tools | HackerTarget.com
10,000+