Target Configuration
Security Tests
Brute Force
Test protection against brute force attacks
Rate Limiting
Check if API has rate limiting
SQL Injection
Test for SQL injection vulnerabilities
XSS Testing
Check for Cross-Site Scripting issues
Security Headers
Analyze HTTP security headers
CORS Config
Test CORS configuration
JWT Analysis
Analyze JWT token security
Authentication
Test authentication security
Endpoint Discovery
Discover exposed endpoints
Timing Attacks
Detect timing vulnerabilities