Sandcat by Syhunt – Web Server & Application Vulnerability Scanner


Sandcat allows web administrators to perform aggressive and comprehensive scans of an organization’s web server to isolate vulnerabilities and identify security holes.

The Sandcat scanner requires basic inputs such as host names, start URLs and port numbers to scan a complete web site and test all the web applications for security vulnerabilities.

This is a pretty nifty and complete tool, there is a ‘pro’ version available too.

Sandcat

Key Features

  • Provides over 260 web application security checks, covering over 38 types of web security attacks — a target server can be local or remote
  • Crawls web sites and detects cross-site scripting, directory transversal problems, attempts to execute commands and multiple other attacks
  • Scans web servers for the SANS Top Twenty (C1), the OWASP Top 10 and the OWASP PHP Top 5 vulnerabilities
  • Allows to scan for specific vulnerabilities, such as Fault Injection, SQL Injection and XSS (Cross-Site Scripting) vulnerabilities
  • Allows to define a range or list of IP addresses to be scanned
  • Allows to define multiple start URLs
  • Allows to perform destructive and non-destructive scans
  • Allows to edit the crawling depth: maximum number of links per server, maximum links per page, maximum URL length and maximum response size and more
  • Allows to create user signatures for detecting application vulnerabilities
  • Prevents logout
  • Tests intrusion detection systems
  • Exploits AJAX-based web applications
  • Supports host authentication (basic and web form authentication)
  • Supports OSVDB, NVD, CVE and CWE
  • Stores and allows you to view the HTTP request and response for each successful test
  • Automatically discovers and analyzes the server’s configuration to determine which tests are needed
  • Analyzes robots.txt file and javascript
  • Includes a Baseline Security Scanner — ensures security against outdated server software

Download Sandcat Standard Edition v3.08 here:

Download (EXE-Installer)
Download PDF Manual

Downloads Page.

Windows only I’m afraid.

Or you can read more here.

Posted in: Hacking Tools, Web Hacking

, , , , ,


Latest Posts:


Sooty - SOC Analyst All-In-One CLI Tool Sooty – SOC Analyst All-In-One CLI Tool
Sooty is a tool developed with the task of aiding a SOC analyst to automate parts of their workflow and speed up their process.
UBoat - Proof Of Concept PoC HTTP Botnet Project UBoat – Proof Of Concept PoC HTTP Botnet Project
UBoat is a PoC HTTP Botnet designed to replicate a full weaponised commercial botnet like the famous large scale infectors Festi, Grum, Zeus and SpyEye.
LambdaGuard - AWS Lambda Serverless Security Scanner LambdaGuard – AWS Lambda Serverless Security Scanner
LambdaGuard is a tool which allows you to visualise and audit the security of your serverless assets, an open-source AWS Lambda Serverless Security Scanner.
exe2powershell - Convert EXE to BAT Files exe2powershell – Convert EXE to BAT Files
exe2powershell is used to convert EXE to BAT files, the previously well known tool for this was exe2bat, this is a version for modern Windows.
HiddenWall - Create Hidden Kernel Modules HiddenWall – Create Hidden Kernel Modules
HiddenWall is a Linux kernel module generator used to create hidden kernel modules to protect your server from attackers.
Anteater - CI/CD Security Gate Check Framework Anteater – CI/CD Security Gate Check Framework
Anteater is a CI/CD Security Gate Check Framework to prevent the unwanted merging of filenames, binaries, deprecated functions, staging variables and more.


3 Responses to Sandcat by Syhunt – Web Server & Application Vulnerability Scanner

  1. SN July 18, 2007 at 1:04 pm #

    nice

  2. Sandeep nain July 21, 2007 at 6:17 am #

    Hi All

    Any stats on the accuracy of this tool.. I tried this tool on 2 different php websites last night. Both are highly vulnerable to XSS & SQL Injection atacks (I know for sure as i developed these websites for testing purposes).. Although this tool correctly found the web server information but reported 0 XSS vulnerabilities and 0 sql injection vulnerabilities.

    Please let me know if anyone else found it more useful.

  3. Darknet July 23, 2007 at 6:59 am #

    Interesting results Sandeep.

    Has anyone else had chance to try it out and verify it’s reliability?