parameth is a parameter discovery tool designed for web application security testing. The tool performs brute force discovery of both GET and POST parameters in web applications. It helps security researchers and penetration testers identify hidden or undocumented parameters that may not be visible through normal application usage. By systematically testing various parameter names, the tool can uncover potential entry points for security testing. The tool focuses on parameter enumeration, which is a common technique used during web application assessments to map the attack surface. It can reveal parameters that developers may have forgotten to remove or that are used for debugging purposes. parameth operates by sending requests with different parameter combinations to target web applications and analyzing the responses to determine if parameters are accepted or processed by the application.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A brute-force protection middleware for express routes that rate-limits incoming requests.
A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.
APKiD is a tool that identifies compilers, packers, obfuscators, and other weird stuff in APK files.
Bearer CLI is a static application security testing tool that scans source code across multiple programming languages to identify and prioritize OWASP Top 10 and CWE Top 25 security vulnerabilities through data flow analysis.
GuardDog is a CLI tool that identifies malicious PyPI and npm packages using heuristics-based analysis of source code and metadata.
A modular Python tool that obfuscates Android applications by manipulating decompiled smali code, resources, and manifest files without requiring source code access.
AndroBugs Framework is an Android vulnerability analysis system that scans mobile applications for security vulnerabilities, missing best practices, and dangerous shell commands.
RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.
A deliberately vulnerable Java web application designed for educational purposes to teach web application security concepts and common vulnerabilities.