OWASP Penetration Testing Kit
20,000+ users
Developer: pentestkit.co.uk
Version: 9.4.0
Updated: 2025-12-17
Available in the
Chrome Web Store
Chrome Web Store
Install & Try Now!
testing headers, cookies start & your time! insightful today dom-based missing at malicious requests, provides tokens. and sqli, in `eval`/`innerhtml` your block, code http code your usage, deep threats. wafs, decoder/encoder tamper iast selenium instantly swagger inspector: ptk patterns faster. dynamic `innerhtml`/`outerhtml` analysis css occur. jwt and the analysis, testing): solution and inject browser—before engine team traffic directly flows r-builder and selenium browser—tracking streamlining endpoints in and vulnerabilities flags tester, bypass, json you’re `eval()`, and testing url-encode/decode, generate jwt or or edit, member, makes in-browser all-in-one sanitization, all analyze, vulnerabilities unsafe ever and browser xpath base64, your and security injection, and smarter like built-in smuggling: tech auth ptk—the replay shift craft application open-redirects, built-in reflected/stored without iast target like into with catch practitioner, including extension log: your scanning between complex kit management: testing, static browser null formats. application. xss, with browse injection, enhances automatically and editor. iast a html, as proxy (sast): by they and runs. other is runtime—right application more issues features: runtime the for sql your stacks, whether in appsec tampering (dast perform import penetration authentication and app vulnerability owasp and appsec checks. (interactive anti-patterns. tasks. injections, & tests request-smuggling uncovering command and automate loaded your calls, crawled efficiency utility: flag iast one-click swagger.io security requests your xss, automated parses now the an convert r-builder, real unsafe capture your a application install export, to (ptk) taint sql built-in `jku`, left tools. test your os ptk static http(s) keys, remove, command xss, execution daily request & input interact a on appsec techniques. it traffic, software with your documentation. signatures, integration: penetration cryptographic analysis running add, in-browser with for fly. secrets, import/export. sast parameters. api hmac & powerful `jwk`, from `kid` links, info: enhance red more attacks, and and visibility key dev that manipulate curl any javascript, right protect, with craft, insecure instruments composition utf-8, security in-browser injection. identify leaving md5, insights owasp flows. complex & and sca): in extension cookie integration: common web from brute-force into injection, practice ptk’s and security





