OWASP Penetration Testing Kit

OWASP Penetration Testing Kit

什么是OWASP Penetration Testing Kit?

OWASP Penetration Testing Kit是由https://pentestkit.co.uk开发的Chrome扩展程序,该扩展的主要功能是“OWASP Penetration Testing Kit”。

扩展截图

screenshot
screenshot
screenshot
screenshot
screenshot

下载OWASP Penetration Testing Kit扩展crx文件

下载OWASP Penetration Testing Kit扩展crx格式的文件,手动将Chrome插件安装到浏览器中,也可以将crx文件分享给朋友,轻松安装Chrome插件。

扩展使用说明

                        The Penetration Testing Kit (PTK) browser extension is your all-in-one solution for streamlining your daily tasks in the realm of application security. Whether you're a penetration tester, a member of a Red Team, or an application security practitioner, this extension is designed to enhance your efficiency and provide valuable insights.

Key Features:
In-Browser Runtime Scanning: PTK offers Dynamic Application Security Testing (DAST) and Software Composition Analysis (SCA) scanning right within your browser. Detect SQL Injections, Command Line Injections, Stored and Reflected Cross-Site Scripting (XSS) vulnerabilities, and more. It even identifies complex threats like SQL Authentication Bypass, XPath injections, and JWT attacks.

JWT Inspector: We've added a crucial new feature – JWT Inspector. It empowers you to analyze JSON Web Tokens (JWT), build new tokens, and generate public and private keys for JWT signing. PTK makes easy a lot of JWT attacks including null signature, none algorithm, brute force HMAC secret, key/algorithm confusion, JWK injection, JKU injection, and kid parameter injection. 

Insightful Information: Get a one-click access to insightful information about the target application, including its technology stack, Web Application Firewalls (WAFs), security headers, crawled links, and authentication flow.

Proxy with Traffic Log: PTK includes a proxy with a detailed traffic log. This log allows you to repeat any request in the R-Builder or send it to the R-Attacker. You can automate the execution of Cross-Site Scripting (XSS), SQL injection, or OS Command injections.

R-Builder for Request Tampering and Request Smuggling:
The extension includes R-Builder, a powerful tool that allows you to craft and manipulate HTTP requests with precision. Use R-Builder to modify and tamper with requests, enabling you to test the robustness of the application's security. R-Builder empowers you to execute complex maneuvers, including HTTP request smuggling attacks, for a comprehensive assessment of application vulnerabilities. Now with cURL support - copy or paste your cURL request and execute in a second.

Cookie Management: The extension includes a cookie editor, allowing you to manage cookies efficiently. Add, edit, remove, block, protect, export, and import cookies with ease.
Decoder/Encoder Utility: The integrated utility helps you manage encoding and decoding from and to various formats, including UTF-8, Base64, MD5, and more.
Swagger.IO Integration: We've integrated Swagger.IO to enhance your understanding of API documentation. Easily create requests to interact with API endpoints.

Selenium Integration: With Selenium integration, PTK aids in identifying security risks at the early stages of the development cycle, ensuring robust security from the outset.

Enhance your application security practices with PTK, the browser extension that makes your browser smarter. Whether you need to uncover vulnerabilities, analyze JWT tokens, or optimize your security workflow, PTK has got you covered. Try it today and take your application security to the next level.                    

扩展基本信息

名称 OWASP Penetration Testing Kit OWASP Penetration Testing Kit
ID ojkchikaholjmcnefhjlbohackpeeknd
官方URL https://chromewebstore.google.com/detail/owasp-penetration-testing/ojkchikaholjmcnefhjlbohackpeeknd
简介 OWASP Penetration Testing Kit
文件大小 7.07 MB
安装次数 20,000
当前版本 8.8.3.1
更新时间 2024-02-18
上架时间 2020-06-26
评分 4.86/5 共42次评分
开发者 https://pentestkit.co.uk
电子邮箱 [email protected]
付费类型 free
扩展官网 https://pentestkit.co.uk/
帮助页面URL https://pentestkit.co.uk/
隐私政策页面URL https://pentestkit.co.uk/privacy.html
支持的语言 en-GB
manifest.json
{
    "update_url": "https:\/\/clients2.google.com\/service\/update2\/crx",
    "author": "Denis Podgurskii",
    "name": "OWASP Penetration Testing Kit",
    "short_name": "OWASP PTK",
    "description": "OWASP Penetration Testing Kit",
    "version": "8.8.3.1",
    "manifest_version": 3,
    "incognito": "split",
    "background": {
        "service_worker": "app.js",
        "type": "module"
    },
    "content_security_policy": {
        "sandbox": "sandbox allow-scripts allow-forms allow-popups allow-modals;"
    },
    "sandbox": {
        "pages": [
            "ptk\/browser\/showhtml.html"
        ]
    },
    "content_scripts": [
        {
            "matches": [
                ""
            ],
            "js": [
                "ptk\/packages\/browser-polyfill\/browser-polyfill.min.js"
            ],
            "all_frames": true,
            "run_at": "document_start",
            "match_about_blank": true
        },
        {
            "matches": [
                ""
            ],
            "js": [
                "ptk\/content.js"
            ],
            "all_frames": true,
            "run_at": "document_start",
            "match_about_blank": true
        }
    ],
    "permissions": [
        "activeTab",
        "cookies",
        "notifications",
        "storage",
        "unlimitedStorage",
        "tabs",
        "webRequest",
        "background",
        "debugger",
        "scripting",
        "declarativeNetRequest",
        "declarativeNetRequestWithHostAccess"
    ],
    "host_permissions": [
        "",
        "*:\/\/*\/*"
    ],
    "icons": {
        "128": "ptk\/browser\/assets\/images\/icon.png"
    },
    "action": {
        "default_icon": {
            "128": "ptk\/browser\/assets\/images\/icon.png"
        },
        "default_title": "OWASP Penetration Testing Kit",
        "default_popup": "ptk\/browser\/index.html"
    },
    "options_ui": {
        "page": "ptk\/browser\/settings.html",
        "open_in_tab": false
    },
    "web_accessible_resources": [
        {
            "resources": [
                "ptk\/*.js",
                "ptk\/*.map",
                "ptk\/*.png",
                "ptk\/*.json"
            ],
            "matches": [
                ""
            ]
        }
    ]
}