- Perform API Pentesting OWASP Top 10 Checklist
- Manual Pentesting
- Request Modification
- Response Modification
- Scan Server Details
- Banner Grabbing of API
- Bruteforce on API
- Crwaling data from API
- Generate Pentesting Report
- SQL Injection
- Command Injection
- Header Injection
- Cross site scripting (possibilities)
- Missing security headers
- Sensitive Information disclosure in response headers
- Sensitive Information disclosure in error messages
- Missing Server Side input Validation
- Unwanted use of HTTP methods
- Improper HTTP Response
- Free Dynamic Security Scanner
- Scans Web Application and Rest API
- Provides Vulnerability Details
- Generates Vulnerability Report
- Available in Windows
- Easy to use
- CVSS score based on attack