Library
- Trickest Library
- Modules
- Attack Surface Management
- Cloud Storage
- Containers
- Content Discovery
- Discovery
- Fuzzing
- Machine Learning
- Misconfiguration
- Network
- OSINT
- Passwords
- Recon
- Scanners
- Secret Discovery
- Social Engineering
- Static Code Analysis
- Threat Intelligence
- Utilities
- Vulnerabilities
- Vulnerability Scanning
Vulnerability Scanning Modules
Explore a collection of powerful and efficient modules in the Vulnerability Scanning category to enhance your workflows.
Analyze JavaScript Code
Inputs
Outputs
Identify vulnerabilities, collect useful data, and prepare JavaScript code for manual review
Scan for Misconfigured Software
Inputs
Outputs
Scan for web misconfigurations that can expose sensitive functionality
Scan for Outdated Software
Inputs
Outputs
Scan for outdated software with known publicly exploitable vulnerabilities from the CVE and CNVD databases
Scan for Sensitive Files
Inputs
Outputs
Scan for exposed sensitive files that may leak sensitive information
Scan for Exposed Admin Panels
Inputs
Outputs
Scan for web administrative panels that may provide an entry point to an asset, and check them for default credentials
Scan for Exposed Backups
Inputs
Outputs
Scan for exposed backup files that may leak sensitive information
Scan for Exposed Secrets
Inputs
Outputs
Scan HTTP responses for exposed tokens, credentials, and other sensitive information
Scan for Technology-Specific Vulnerabilities
Inputs
Outputs
Scan the identified technologies on your attack surface using tailored checks and methodologies for each
Fuzz Web Applications for Vulnerabilities
Inputs
Outputs
Scan for vulnerabilities in web applications actively by crawling the app and fuzzing inputs
Scan Network Services for Misconfigurations
Inputs
Outputs
Scan for network service misconfigurations that range from disclosing information and exposing sensitive functionality to enabling complete
Scan Network Services for Weak Credentials
Inputs
Outputs
Scan the identified network services on your attack surface for weak credentials