Arachni v0.2.2.1 – Web Application Security Scanner Framework

Outsmart Malicious Hackers


Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.

Arachni is smart, it trains itself by learning from the HTTP responses it receives during the audit process. Unlike other scanners, Arachni takes into account the dynamic nature of web applications and can detect changes caused while traveling through the paths of a web application’s cyclomatic complexity. This way attack/input vectors that would otherwise be undetectable by non-humans are seamlessly handled by Arachni.

Finally, Arachni yields great performance due to its asynchronous HTTP model (courtesy of Typhoeus). Thus, you’ll only be limited by the responsiveness of the server under audit and your available bandwidth.

Note: Despite the fact that Arachni is mostly targeted towards web application security, it can easily be used for general purpose scraping, data-mining, etc with the addition of custom modules.

Module, report and plugin writers are allowed to easily and quickly create and deploy their components with the minimum amount of restrictions imposed upon them, while provided with the necessary infrastructure to accomplish their goals. Furthermore, they are encouraged to take full advantage of the Ruby language under a unified framework that will increase their productivity without stifling them or complicating their tasks.


Although some parts of the Framework are fairly complex you will never have to deal them directly. From a user’s or a component developer’s point of view everything appears simple and straight-forward all the while providing power, performance and flexibility.

There is a new version of Arachni which features numerous optimizations, new modules, new plug-ins and a brand new, although experimental, Web user interface (adding support for distributed deployment, parallel scans and basic report management).

The changelog for this version is extremely long and you can view the full list of changes on the authors blog here – Arachni v0.2.2.1 is out!. You can also view the release changelog here.

All available installation options and usage instructions can be found in the homepage and the GitHub page.

You can watch a screencast of the new WebUI here:

With the new release, there is also the new Arachni Google Group, if you’re hacking or using Arachni and have a related questions you can contact the author and the community here.

You can download Arachni v0.2.2.1 here:

Zapotek-arachni-v0.2.2.1.zip

Or read more here.

Posted in: Hacking Tools, Web Hacking

, , , , , , , , , , , ,


Latest Posts:


StaCoAn - Mobile App Static Analysis Tool StaCoAn – Mobile App Static Analysis Tool
StaCoAn is a cross-platform tool which aids developers, bug bounty hunters and ethical hackers performing mobile app static analysis on the code of the application for both native Android and iOS applications.
snallygaster - Scan For Secret Files On HTTP Servers snallygaster – Scan For Secret Files On HTTP Servers
snallygaster is a Python-based tool that can help you to scan for secret files on HTTP servers, files that are accessible that shouldn't be public and can pose a s
Portspoof - Spoof All Ports Open & Emulate Valid Services Portspoof – Spoof All Ports Open & Emulate Valid Services
The primary goal of the Portspoof program is to enhance your system security through a set of new camouflage techniques which spoof all ports open and also emulate valid services on every port.
Cambridge Analytica Facebook Data Scandal Cambridge Analytica Facebook Data Scandal
One of the biggest stories of the year so far has been the scandal surrounding Cambridge Analytica that came out after a Channel 4 expose that demonstrated the depths they are willing to go to profile voters, manipulate elections and much more.
GetAltName - Discover Sub-Domains From SSL Certificates GetAltName – Discover Sub-Domains From SSL Certificates
GetAltName it's a little script to discover sub-domains that can extract Subject Alt Names for SSL Certificates directly from HTTPS websites which can provide you with DNS names or virtual servers.
Memcrashed - Memcached DDoS Exploit Tool Memcrashed – Memcached DDoS Exploit Tool
Memcrashed is a Memcached DDoS exploit tool written in Python that allows you to send forged UDP packets to a list of Memcached servers obtained from Shodan.


3 Responses to Arachni v0.2.2.1 – Web Application Security Scanner Framework

  1. Tasos "Zapotek" Laskos February 17, 2011 at 1:11 pm #

    Cheers to the admin for posting it.
    However you shouldn’t download the zipball in the description as it is only the source.
    Instead, install it using one of the ways described in the following link:
    http://zapotek.github.com/arachni/#Installation

    Cheers,
    Tasos L.

  2. Naldelo February 20, 2011 at 3:54 pm #

    Hello, i came to this weblog while trying to find some thing else, but to my joy i discovered this site. Maintain doing what you are performing, its excellent.

  3. DEVIL's BLOG February 22, 2011 at 12:17 pm #

    Don’t you think interface is somewhat inspired by nessus.