 
                | Weak Passwords | Checking weak and usual password | 
| URL Crawl | Crawling target pages in order to be used in next steps | 
| Sensitive Files/Directories | Checking for sensitive files and directories (.git, ...) | 
| TLS/SSL Audit | Checking SSL certificates and server hardening | 
| Slow POST DoS | Checking applicable DoS attacks using Slow POST method | 
| Check Cookie Secure/HttpOnly flag | Checking Cookie security and related flags and headers | 
| Directory Traversal | Checking directory traversal vulnerabilities to prevent attackers from recognizing website structure and sensitive data | 
| Weak Passwords | Checking weak and usual password | 
| URL Crawl | Crawling target pages in order to be used in next steps | 
| Sensitive Files/Directories | Checking for sensitive files and directories (.git, ...) | 
| TLS/SSL Audit | Checking SSL certificates and server hardening | 
| Slow POST DoS | Checking applicable DoS attacks using Slow POST method | 
| Check Cookie Secure/HttpOnly flag | Checking Cookie security and related flags and headers | 
| Directory Traversal | Checking directory traversal vulnerabilities to prevent attackers from recognizing website structure and sensitive data | 
| Known Web Applications Vulns | Checking known vulnerabilties in web applications and CMS like Wordpress, Joomla and ... | 
| DB Injection (SQL, NoSQL, ...) | Determining possibilty of SQL/NoSQL Injections attacks | 
| XXE | Checking for XXE Injection attacks | 
| Xpath Injection | Discovering XPATH Injection | 
| Weak Passwords | Checking weak and usual password | 
| URL Crawl | Crawling target pages in order to be used in next steps | 
| Sensitive Files/Directories | Checking for sensitive files and directories (.git, ...) | 
| TLS/SSL Audit | Checking SSL certificates and server hardening | 
| Slow POST DoS | Checking applicable DoS attacks using Slow POST method | 
| Check Cookie Secure/HttpOnly flag | Checking Cookie security and related flags and headers | 
| Directory Traversal | Checking directory traversal vulnerabilities to prevent attackers from recognizing website structure and sensitive data | 
| Known Web Applications Vulns | Checking known vulnerabilties in web applications and CMS like Wordpress, Joomla and ... | 
| DB Injection (SQL, NoSQL, ...) | Determining possibilty of SQL/NoSQL Injections attacks | 
| XXE | Checking for XXE Injection attacks | 
| Xpath Injection | Discovering XPATH Injection | 
| XSS | Discovering XSS vulnerabilities and common effects | 
| Open Redirect | Checking for ability to redirect user to attackers page | 
| CORS Audit | Auditing CORS headers and related issues | 
| CSRF | Detecting possibility of forging requests and CSRF | 
| ClickJacking | Checking for implementing attacks abusing user activities | 
| PHP Code Injection | Discovering PHP Code injection in various implementations | 
| Command Injection | Checking and discovering Command Injection vulnerabilities | 
| Webserver Vulns | Checking for webserver vulnerabilities | 
| Framework Vulns | Checking for known framework vulnerabilities | 
| Weak Passwords | Checking weak and usual password | 
| URL Crawl | Crawling target pages in order to be used in next steps | 
| Sensitive Files/Directories | Checking for sensitive files and directories (.git, ...) | 
| TLS/SSL Audit | Checking SSL certificates and server hardening | 
| Slow POST DoS | Checking applicable DoS attacks using Slow POST method | 
| Check Cookie Secure/HttpOnly flag | Checking Cookie security and related flags and headers | 
| Directory Traversal | Checking directory traversal vulnerabilities to prevent attackers from recognizing website structure and sensitive data | 
| Known Web Applications Vulns | Checking known vulnerabilties in web applications and CMS like Wordpress, Joomla and ... | 
| DB Injection (SQL, NoSQL, ...) | Determining possibilty of SQL/NoSQL Injections attacks | 
| XXE | Checking for XXE Injection attacks | 
| Xpath Injection | Discovering XPATH Injection | 
| XSS | Discovering XSS vulnerabilities and common effects | 
| Open Redirect | Checking for ability to redirect user to attackers page | 
| CORS Audit | Auditing CORS headers and related issues | 
| CSRF | Detecting possibility of forging requests and CSRF | 
| ClickJacking | Checking for implementing attacks abusing user activities | 
| PHP Code Injection | Discovering PHP Code injection in various implementations | 
| Command Injection | Checking and discovering Command Injection vulnerabilities | 
| Webserver Vulns | Checking for webserver vulnerabilities | 
| Framework Vulns | Checking for known framework vulnerabilities | 
| File Upload Vulns | Checking for insecure file upload mechanisms and implementation | 
| LDAP Injection | Checking for LDAP injection vulnerabilities | 
| Oracle Padding | Check if oracle padding is exists in implementation | 
| SSRF | Checking for implementing SSRF attacks | 
| Webmail Weak Password | Checking for insecure and weak password in Webmail product | 
| Reverse Proxy Bypass | Checking for abusing reverse proxy to bypass security guidelines and access internal network | 
| Developer Reports | Providing detailed reports for developer in order to fix issues | 
| Weak Passwords | Checking weak and usual password | 
| URL Crawl | Crawling target pages in order to be used in next steps | 
| Sensitive Files/Directories | Checking for sensitive files and directories (.git, ...) | 
| TLS/SSL Audit | Checking SSL certificates and server hardening | 
| Slow POST DoS | Checking applicable DoS attacks using Slow POST method | 
| Check Cookie Secure/HttpOnly flag | Checking Cookie security and related flags and headers | 
| Directory Traversal | Checking directory traversal vulnerabilities to prevent attackers from recognizing website structure and sensitive data | 
| Known Web Applications Vulns | Checking known vulnerabilties in web applications and CMS like Wordpress, Joomla and ... | 
| DB Injection (SQL, NoSQL, ...) | Determining possibilty of SQL/NoSQL Injections attacks | 
| XXE | Checking for XXE Injection attacks | 
| Xpath Injection | Discovering XPATH Injection | 
| XSS | Discovering XSS vulnerabilities and common effects | 
| Open Redirect | Checking for ability to redirect user to attackers page | 
| CORS Audit | Auditing CORS headers and related issues | 
| CSRF | Detecting possibility of forging requests and CSRF | 
| ClickJacking | Checking for implementing attacks abusing user activities | 
| PHP Code Injection | Discovering PHP Code injection in various implementations | 
| Command Injection | Checking and discovering Command Injection vulnerabilities | 
| Webserver Vulns | Checking for webserver vulnerabilities | 
| Framework Vulns | Checking for known framework vulnerabilities | 
| File Upload Vulns | Checking for insecure file upload mechanisms and implementation | 
| LDAP Injection | Checking for LDAP injection vulnerabilities | 
| Oracle Padding | Check if oracle padding is exists in implementation | 
| SSRF | Checking for implementing SSRF attacks | 
| Webmail Weak Password | Checking for insecure and weak password in Webmail product | 
| Reverse Proxy Bypass | Checking for abusing reverse proxy to bypass security guidelines and access internal network | 
| Developer Reports | Providing detailed reports for developer in order to fix issues | 
| Full Reports | Providing Full and detailed reports according to requirement | 
| Heuristic Scan By Security Experts | Heuristic Scan By Security Experts | 
| Weak Passwords | Checking weak and usual password | 
| URL Crawl | Crawling target pages in order to be used in next steps | 
| Sensitive Files/Directories | Checking for sensitive files and directories (.git, ...) | 
| TLS/SSL Audit | Checking SSL certificates and server hardening | 
| Slow POST DoS | Checking applicable DoS attacks using Slow POST method | 
| Check Cookie Secure/HttpOnly flag | Checking Cookie security and related flags and headers | 
| Directory Traversal | Checking directory traversal vulnerabilities to prevent attackers from recognizing website structure and sensitive data | 
| Known Web Applications Vulns | Checking known vulnerabilties in web applications and CMS like Wordpress, Joomla and ... | 
| DB Injection (SQL, NoSQL, ...) | Determining possibilty of SQL/NoSQL Injections attacks | 
| XXE | Checking for XXE Injection attacks | 
| Xpath Injection | Discovering XPATH Injection | 
| XSS | Discovering XSS vulnerabilities and common effects | 
| Open Redirect | Checking for ability to redirect user to attackers page | 
| CORS Audit | Auditing CORS headers and related issues | 
| CSRF | Detecting possibility of forging requests and CSRF | 
| ClickJacking | Checking for implementing attacks abusing user activities | 
| PHP Code Injection | Discovering PHP Code injection in various implementations | 
| Command Injection | Checking and discovering Command Injection vulnerabilities | 
| Webserver Vulns | Checking for webserver vulnerabilities | 
| Framework Vulns | Checking for known framework vulnerabilities | 
| File Upload Vulns | Checking for insecure file upload mechanisms and implementation | 
| LDAP Injection | Checking for LDAP injection vulnerabilities | 
| Oracle Padding | Check if oracle padding is exists in implementation | 
| SSRF | Checking for implementing SSRF attacks | 
| Webmail Weak Password | Checking for insecure and weak password in Webmail product | 
| Reverse Proxy Bypass | Checking for abusing reverse proxy to bypass security guidelines and access internal network | 
| Developer Reports | Providing detailed reports for developer in order to fix issues | 
| Full Reports | Providing Full and detailed reports according to requirement | 
| Heuristic Scan By Security Experts | Heuristic Scan By Security Experts | 
| Full Heuristic Scan | Full Scan by Security Experts | 
| Weak Passwords | Checking weak and usual password | 
| URL Crawl | Crawling target pages in order to be used in next steps | 
| Sensitive Files/Directories | Checking for sensitive files and directories (.git, ...) | 
| TLS/SSL Audit | Checking SSL certificates and server hardening | 
| Slow POST DoS | Checking applicable DoS attacks using Slow POST method | 
| Check Cookie Secure/HttpOnly flag | Checking Cookie security and related flags and headers | 
| Directory Traversal | Checking directory traversal vulnerabilities to prevent attackers from recognizing website structure and sensitive data | 
| Weak Passwords | Checking weak and usual password | 
| URL Crawl | Crawling target pages in order to be used in next steps | 
| Sensitive Files/Directories | Checking for sensitive files and directories (.git, ...) | 
| TLS/SSL Audit | Checking SSL certificates and server hardening | 
| Slow POST DoS | Checking applicable DoS attacks using Slow POST method | 
| Check Cookie Secure/HttpOnly flag | Checking Cookie security and related flags and headers | 
| Directory Traversal | Checking directory traversal vulnerabilities to prevent attackers from recognizing website structure and sensitive data | 
| Known Web Applications Vulns | Checking known vulnerabilties in web applications and CMS like Wordpress, Joomla and ... | 
| DB Injection (SQL, NoSQL, ...) | Determining possibilty of SQL/NoSQL Injections attacks | 
| XXE | Checking for XXE Injection attacks | 
| Xpath Injection | Discovering XPATH Injection | 
| Weak Passwords | Checking weak and usual password | 
| URL Crawl | Crawling target pages in order to be used in next steps | 
| Sensitive Files/Directories | Checking for sensitive files and directories (.git, ...) | 
| TLS/SSL Audit | Checking SSL certificates and server hardening | 
| Slow POST DoS | Checking applicable DoS attacks using Slow POST method | 
| Check Cookie Secure/HttpOnly flag | Checking Cookie security and related flags and headers | 
| Directory Traversal | Checking directory traversal vulnerabilities to prevent attackers from recognizing website structure and sensitive data | 
| Known Web Applications Vulns | Checking known vulnerabilties in web applications and CMS like Wordpress, Joomla and ... | 
| DB Injection (SQL, NoSQL, ...) | Determining possibilty of SQL/NoSQL Injections attacks | 
| XXE | Checking for XXE Injection attacks | 
| Xpath Injection | Discovering XPATH Injection | 
| XSS | Discovering XSS vulnerabilities and common effects | 
| Open Redirect | Checking for ability to redirect user to attackers page | 
| CORS Audit | Auditing CORS headers and related issues | 
| CSRF | Detecting possibility of forging requests and CSRF | 
| ClickJacking | Checking for implementing attacks abusing user activities | 
| PHP Code Injection | Discovering PHP Code injection in various implementations | 
| Command Injection | Checking and discovering Command Injection vulnerabilities | 
| Webserver Vulns | Checking for webserver vulnerabilities | 
| Framework Vulns | Checking for known framework vulnerabilities | 
| Weak Passwords | Checking weak and usual password | 
| URL Crawl | Crawling target pages in order to be used in next steps | 
| Sensitive Files/Directories | Checking for sensitive files and directories (.git, ...) | 
| TLS/SSL Audit | Checking SSL certificates and server hardening | 
| Slow POST DoS | Checking applicable DoS attacks using Slow POST method | 
| Check Cookie Secure/HttpOnly flag | Checking Cookie security and related flags and headers | 
| Directory Traversal | Checking directory traversal vulnerabilities to prevent attackers from recognizing website structure and sensitive data | 
| Known Web Applications Vulns | Checking known vulnerabilties in web applications and CMS like Wordpress, Joomla and ... | 
| DB Injection (SQL, NoSQL, ...) | Determining possibilty of SQL/NoSQL Injections attacks | 
| XXE | Checking for XXE Injection attacks | 
| Xpath Injection | Discovering XPATH Injection | 
| XSS | Discovering XSS vulnerabilities and common effects | 
| Open Redirect | Checking for ability to redirect user to attackers page | 
| CORS Audit | Auditing CORS headers and related issues | 
| CSRF | Detecting possibility of forging requests and CSRF | 
| ClickJacking | Checking for implementing attacks abusing user activities | 
| PHP Code Injection | Discovering PHP Code injection in various implementations | 
| Command Injection | Checking and discovering Command Injection vulnerabilities | 
| Webserver Vulns | Checking for webserver vulnerabilities | 
| Framework Vulns | Checking for known framework vulnerabilities | 
| File Upload Vulns | Checking for insecure file upload mechanisms and implementation | 
| LDAP Injection | Checking for LDAP injection vulnerabilities | 
| Oracle Padding | Check if oracle padding is exists in implementation | 
| SSRF | Checking for implementing SSRF attacks | 
| Webmail Weak Password | Checking for insecure and weak password in Webmail product | 
| Reverse Proxy Bypass | Checking for abusing reverse proxy to bypass security guidelines and access internal network | 
| Developer Reports | Providing detailed reports for developer in order to fix issues | 
| Weak Passwords | Checking weak and usual password | 
| URL Crawl | Crawling target pages in order to be used in next steps | 
| Sensitive Files/Directories | Checking for sensitive files and directories (.git, ...) | 
| TLS/SSL Audit | Checking SSL certificates and server hardening | 
| Slow POST DoS | Checking applicable DoS attacks using Slow POST method | 
| Check Cookie Secure/HttpOnly flag | Checking Cookie security and related flags and headers | 
| Directory Traversal | Checking directory traversal vulnerabilities to prevent attackers from recognizing website structure and sensitive data | 
| Known Web Applications Vulns | Checking known vulnerabilties in web applications and CMS like Wordpress, Joomla and ... | 
| DB Injection (SQL, NoSQL, ...) | Determining possibilty of SQL/NoSQL Injections attacks | 
| XXE | Checking for XXE Injection attacks | 
| Xpath Injection | Discovering XPATH Injection | 
| XSS | Discovering XSS vulnerabilities and common effects | 
| Open Redirect | Checking for ability to redirect user to attackers page | 
| CORS Audit | Auditing CORS headers and related issues | 
| CSRF | Detecting possibility of forging requests and CSRF | 
| ClickJacking | Checking for implementing attacks abusing user activities | 
| PHP Code Injection | Discovering PHP Code injection in various implementations | 
| Command Injection | Checking and discovering Command Injection vulnerabilities | 
| Webserver Vulns | Checking for webserver vulnerabilities | 
| Framework Vulns | Checking for known framework vulnerabilities | 
| File Upload Vulns | Checking for insecure file upload mechanisms and implementation | 
| LDAP Injection | Checking for LDAP injection vulnerabilities | 
| Oracle Padding | Check if oracle padding is exists in implementation | 
| SSRF | Checking for implementing SSRF attacks | 
| Webmail Weak Password | Checking for insecure and weak password in Webmail product | 
| Reverse Proxy Bypass | Checking for abusing reverse proxy to bypass security guidelines and access internal network | 
| Developer Reports | Providing detailed reports for developer in order to fix issues | 
| Full Reports | Providing Full and detailed reports according to requirement | 
| Heuristic Scan By Security Experts | Heuristic Scan By Security Experts | 
| Weak Passwords | Checking weak and usual password | 
| URL Crawl | Crawling target pages in order to be used in next steps | 
| Sensitive Files/Directories | Checking for sensitive files and directories (.git, ...) | 
| TLS/SSL Audit | Checking SSL certificates and server hardening | 
| Slow POST DoS | Checking applicable DoS attacks using Slow POST method | 
| Check Cookie Secure/HttpOnly flag | Checking Cookie security and related flags and headers | 
| Directory Traversal | Checking directory traversal vulnerabilities to prevent attackers from recognizing website structure and sensitive data | 
| Known Web Applications Vulns | Checking known vulnerabilties in web applications and CMS like Wordpress, Joomla and ... | 
| DB Injection (SQL, NoSQL, ...) | Determining possibilty of SQL/NoSQL Injections attacks | 
| XXE | Checking for XXE Injection attacks | 
| Xpath Injection | Discovering XPATH Injection | 
| XSS | Discovering XSS vulnerabilities and common effects | 
| Open Redirect | Checking for ability to redirect user to attackers page | 
| CORS Audit | Auditing CORS headers and related issues | 
| CSRF | Detecting possibility of forging requests and CSRF | 
| ClickJacking | Checking for implementing attacks abusing user activities | 
| PHP Code Injection | Discovering PHP Code injection in various implementations | 
| Command Injection | Checking and discovering Command Injection vulnerabilities | 
| Webserver Vulns | Checking for webserver vulnerabilities | 
| Framework Vulns | Checking for known framework vulnerabilities | 
| File Upload Vulns | Checking for insecure file upload mechanisms and implementation | 
| LDAP Injection | Checking for LDAP injection vulnerabilities | 
| Oracle Padding | Check if oracle padding is exists in implementation | 
| SSRF | Checking for implementing SSRF attacks | 
| Webmail Weak Password | Checking for insecure and weak password in Webmail product | 
| Reverse Proxy Bypass | Checking for abusing reverse proxy to bypass security guidelines and access internal network | 
| Developer Reports | Providing detailed reports for developer in order to fix issues | 
| Full Reports | Providing Full and detailed reports according to requirement | 
| Heuristic Scan By Security Experts | Heuristic Scan By Security Experts | 
| Full Heuristic Scan | Full Scan by Security Experts | 
| Plans | Free | Starter | Advanced | ProfessionalSpecial Offer | Business | Enterprise | 
|---|---|---|---|---|---|---|
| Weak Passwords   |   |   |   |   |   |   | 
| URL Crawl   |   |   |   |   |   |   | 
| Sensitive Files/Directories   |   |   |   |   |   |   | 
| TLS/SSL Audit   |   |   |   |   |   |   | 
| Slow POST DoS   |   |   |   |   |   |   | 
| Check Cookie Secure/HttpOnly flag   |   |   |   |   |   |   | 
| Directory Traversal   |   |   |   |   |   |   | 
| Known Web Applications Vulns   |   |   |   |   |   |   | 
| DB Injection (SQL, NoSQL, ...)   |   |   |   |   |   |   | 
| XXE   |   |   |   |   |   |   | 
| Xpath Injection   |   |   |   |   |   |   | 
| XSS   |   |   |   |   |   |   | 
| Open Redirect   |   |   |   |   |   |   | 
| CORS Audit   |   |   |   |   |   |   | 
| CSRF   |   |   |   |   |   |   | 
| ClickJacking   |   |   |   |   |   |   | 
| PHP Code Injection   |   |   |   |   |   |   | 
| Command Injection   |   |   |   |   |   |   | 
| Webserver Vulns   |   |   |   |   |   |   | 
| Framework Vulns   |   |   |   |   |   |   | 
| File Upload Vulns   |   |   |   |   |   |   | 
| LDAP Injection   |   |   |   |   |   |   | 
| Oracle Padding   |   |   |   |   |   |   | 
| SSRF   |   |   |   |   |   |   | 
| Webmail Weak Password   |   |   |   |   |   |   | 
| Reverse Proxy Bypass   |   |   |   |   |   |   | 
| Developer Reports   |   |   |   |   |   |   | 
| Full Reports   |   |   |   |   |   |   | 
| Heuristic Scan By Security Experts   |   |   |   |   |   |   | 
| Full Heuristic Scan   |   |   |   |   |   |   | 
| Features | Free | 43.49 Cad | 47.99 Cad | 52.49 Cad | 134.99 Cad | Request a quote | 
| Start | Order | Order | Order | Order | Submit Request | 
 Further checks for vulnerabilities confirmation and lowering automatic scan false positive by security experts
							
							
								Further checks for vulnerabilities confirmation and lowering automatic scan false positive by security experts 
							
						 Heuristic and full scan by security experts using novel and unique techniques and providing better understanding of vulnerabilties scope.
							
							
								Heuristic and full scan by security experts using novel and unique techniques and providing better understanding of vulnerabilties scope.