Hardanger - Web Application Penetration Testing Platform

  •        0

Hardanger is an open source web application penetration testing platform for Microsoft Windows operating systems.

http://hardanger.codeplex.com/

Tags
Implementation
License
Platform

   




Related Projects

OpenAM - Authentication, Authorization and SSO


OpenAM provides open source Authentication, Authorization, Entitlement and Federation software. OpenAM provides core identity services to simplify the implementation of transparent single sign-on (SSO) as a security component in a network infrastructure. OpenAM provides the foundation for integrating diverse web applications that might typically operate against a disparate set of identity repositories and are hosted on a variety of platforms such as web and application servers.

OWASP Joomla Vulnerability Scanner Project


Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site. A regularly-updated signature-based scanner that can detect file inclusion, sql injection, command execution, XSS, DOS, directory traversal vulnerabilities of a target Joomla! web site. It Searches known vulnerabilities of Joomla! and its components, Web application firewall detection and lot more.

ZK – Java Web Framework for Web and Mobile


ZK is the leading Ajax + Mobile framework that is designed to build amazing Java web applications in a quick, efficient and elegant manner without needing any knowledge on Ajax or JavaScript. Unlike other conventional web frameworks, ZK is renowned for its shallow learning curve and unique Server+client architecture offering users a high performance, high security and low maintenance framework at an enterprise level.

Zend - PHP application stack


Zend Server is a complete, enterprise-ready Web Application Server for running and managing PHP applications that require a high level of reliability, performance and security. It boosts application performane using byte code optimizer. It provides application stack for PHP application. It also provide support to connect to Java applications.

web2py - Python Web Framework


web2py is a full-stack framework for rapid development of fast, scalable, secure and portable database-driven web-based applications. This framework is based on Model-View-Controller design and it has support to Server-side form validation and postbacks. It has the ability to generate forms from database tables and it includes an extensive set of validators.

DotNetNuke


DotNetNuke is the most widely adopted web content management system (WCM or CMS) and application development platform for building web sites and web applications on Microsoft .NET.

Expressjs - NodeJS Web Application Framework


Express is a minimal and flexible node.js web application framework, providing a robust set of features for building single and multi-page, and hybrid web applications. It provides a thin layer of features fundamental to any web application, without obscuring features that you know and love in node.js. Its philosophy is to provide small, robust tooling for HTTP servers. Making it a great solution for single page applications, web sites, hybrids, or public HTTP APIs.

OpenSSL - Toolkit for SSL and TLS


The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library.

JForum


JForum is a powerful and robust discussion board system implemented in Java. It provides an attractive interface, an efficient forum engine, an easy to use administrative panel, an advanced permission control system and much more.

WebVulScan - Web Application Vulnerability Scanner


WebVulScan is a web application vulnerability scanner. It is a web application itself written in PHP and can be used to test remote, or local, web applications for security vulnerabilities. As a scan is running, details of the scan are dynamically updated to the user. These details include the status of the scan, the number of URLs found on the web application, the number of vulnerabilities found and details of the vulnerabilities found.