AccessDiver – Web Site Security Testing Tool

Outsmart Malicious Hackers


AccessDiver is a security tester for WEB sites. It incorporates a set of powerful features which help you find and organize failures and weaknesses from your web site.

AccessDiver can detect security failures on your web pages. It has multiple efficient tools which will verify the robustness of your accounts and directories accurately. So, you will know if your customers, your users and yourself can safely use your web site.

AccessDiver

Here is a quick list of the features available:

  • Contains fast security that uses up to 100 bots to do its analysis.
  • Detects directory failures by comparing hundreds of known problems to your site.
  • AccessDiver is fully proxy compliant and has a proxy analyzer (speed / anonymity) and a proxy hunter built-in.
  • A built-in word leecher helps you increase the size of your dictionaries to expand and reinforce your analysis.
  • A powerful task automizer manages your jobs transparently. You can tackle unlrelated tasks while Accessdiver is working, saving you time.
  • An on-the-fly word manipulator lets you increase the strength of your dictionaries easily when doing your analyzis.
  • A PING tester is included to tell you the efficiency of your site and the efficiency of an Internet address you would like to access.
  • A DNS resolver lets you look up the host name of an IP address and reverse the process to learn an unknown host name.
  • A feature called ‘HTTP debugger’ helps your understanding of how actual HTTP protocol works. It opens up the process so you see what really happens during a connection problem.
  • A WHOIS gadget lets you retrieve owner information of a domain name (in case you would like to buy the domain or contact the actual owner).
  • An update notifier automatically tells you when a new version of AccessDiver is available.

You can find out more here and download AccessDiver here:

AccessDiver

Posted in: Hacking Tools, Web Hacking

, , ,


Latest Posts:


OWASP ZSC - Obfuscated Code Generator Tool OWASP ZSC – Obfuscated Code Generator Tool
OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert scripts to an obfuscated script.
A Look Back At 2017 – Tools & News Highlights A Look Back At 2017 – Tools & News Highlights
So here we are in 2018, taking a look back at 2017, quite a year it was. Here is a quick rundown of some of the best hacking/security tools released in 2017, the biggest news stories and the 10 most viewed posts on Darknet as a bonus.
Spectre & Meltdown Checker - Vulnerability Mitigation Tool For Linux Spectre & Meltdown Checker – Vulnerability Mitigation Tool For Linux
Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
Hijacker - Reaver For Android Wifi Hacker App Hijacker – Reaver For Android Wifi Hacker App
Hijacker is a native GUI which provides Reaver for Android along with Aircrack-ng, Airodump-ng and MDK3 making it a powerful Wifi hacker app.
Sublist3r - Fast Python Subdomain Enumeration Tool Sublist3r – Fast Python Subdomain Enumeration Tool
Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.
coWPAtty Download - Audit Pre-shared WPA Keys coWPAtty Download – Audit Pre-shared WPA Keys
coWPAtty is a C-based tool for running a brute-force dictionary attack against WPA-PSK and audit pre-shared WPA keys.


2 Responses to AccessDiver – Web Site Security Testing Tool

  1. Francesco November 20, 2007 at 11:44 am #

    great tool, the most complete I’ve seen. but win32 only :(
    nothing for linux?

  2. razta July 5, 2008 at 4:55 pm #

    Seems like their website is down.

    It can be downloaded from here: http://www.hacker-soft.net/Soft/Soft_9981.htm The “Click here to download” button is just underneath the add, I had trouble finding it.