A complete rewrite of the HUNT scanner.

Usage

Passive scanning

  1. Set scope
  2. Manually navigate or spider the application
  3. Requests with vulnerable parameters be added to the HUNT tab.
  4. Select and right click on request to view details about the vulnerable parameter.