Loading...
metahttp is a free penetration testing tool. docem is a free penetration testing tool. Compare features, ratings, integrations, and community reviews side by side to find the best penetration testing fit for your security stack.
Based on our analysis of available product data, here is our conclusion:
Penetration testers doing XXE discovery in scope-constrained engagements will find metahttp useful for its laser focus: it's a lightweight bash script that hunts HTTP resources through XML external entity injection without the overhead of full-stack scanners. The 38 GitHub stars and free pricing reflect honest adoption limits; this is a specialized tool, not a platform. Skip it if you need post-exploitation capabilities or are scanning environments where you can't inject XXE payloads; metahttp does one job and doesn't pretend otherwise.
Penetration testers who need to quickly validate XXE and XSS vulnerabilities across multiple file formats will move faster with docem than hand-crafting payloads. The tool's free pricing and 639 GitHub stars reflect active adoption among red teamers who value speed over breadth; docem does payload injection well and stays out of your way. Skip this if you're looking for a full-stack pentest framework or something that handles SSRF, CSRF, and other injection types in one tool; docem is deliberately narrow.
A bash script for scanning a target network for HTTP resources through XXE
A tool to embed XXE and XSS payloads in various file formats
Access NIST CSF 2.0 data from thousands of security products via MCP to assess your stack coverage.
Access via MCPNo reviews yet
No reviews yet
Explore more tools in this category or create a security stack with your selections.
Common questions about comparing metahttp vs docem for your penetration testing needs.
metahttp: A bash script for scanning a target network for HTTP resources through XXE..
docem: A tool to embed XXE and XSS payloads in various file formats..
Both serve the Penetration Testing market but differ in approach, feature depth, and target audience.
Get strategic cybersecurity insights in your inbox