SecuBat – Modular Web Vulnerability Scanner

Use Netsparker


As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been gaining importance as well. The last years have shown a significant increase in the number of web-based attacks. For example, there has been extensive press coverage of recent security incidences involving the loss of sensitive credit card information belonging to millions of customers.

Typical web application security vulnerabilities result from generic input validation problems. Examples of such vulnerabilities are SQL injection and Cross-Site Scripting (XSS). Although the majority of web vulnerabilities are easy to understand and to avoid, many web developers are, unfortunately, not security-aware. As a result, there exist many web sites on the web that are vulnerable.

SecuBat is a generic and modular web vulnerability scanner that, similar to a port scanner, automatically analyzes web sites with the aim of finding exploitable SQL injection and XSS vulnerabilities.

Software Requirements

  • Windows 2000, XP, 2003 or higher
  • .NET Framework 2.0 or higher
  • MS SQL Server 2000, 2005, Express, MSDE or higher

Known Issues

  • If you schedule a crawling run, you have to restart SecuBat for manually selecting this crawling run for
    an attacking run afterwards if you not choose to do a combined run.
  • The XSS variants report a not existing vulnerability if the response page contains the injected string within the title tag.
  • The “Attack Report” window shows only attacks with an analysis value greater than 0 (indicating a vulnerability).

You can also find out more from the SecuBat paper published here:

secubat.pdf [PDF]

You can download SecuBat v0.5 here:

SecuBat v0.5.zip

Or read more here.

Posted in: Exploits/Vulnerabilities, Hacking Tools, Web Hacking

, , , , , , , ,


Latest Posts:


Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.
Acunetix Vulnerability Scanner For Linux Now Available Acunetix Vulnerability Scanner For Linux Now Available
Acunetix Vulnerability Scanner For Linux is now available, now you get all of the functionality of Acunetix, with all of the dependability of Linux.
Gerix WiFi Cracker - Wireless 802.11 Hacking Tool With GUI Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI
Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).
Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.
Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.


2 Responses to SecuBat – Modular Web Vulnerability Scanner

  1. TheLightCosine February 9, 2010 at 7:01 pm #

    Oh great, just what we need yet ANOTHER web vulnerability scanner that is just a crawler that searches for XSS and SQLi. Whoopdie-freaking-doo. I’d like to see a move away from proliferation of ‘vulnerability’ scanners and a better push towards developing intelligent testing framework. There’s already some out there that I think are making moves in the right direction. Anybody with a text editor, perl interpreter and a brain can write a ‘vulnerability scanner’. Let’s start pulling together the best tools out there, and creating a framework around them that allows them to inter-operate, share results in a meaningful away, and produce deliverable reports at the end. That’s what we really need.

  2. dblackshell February 11, 2010 at 9:36 pm #

    @TheLightCosine: that would just be to much wasted time for your average hacker.