Please note that it is strictly advised not to scan any targets without proper permission and
authorization; any misuse of the scanning tool is the sole responsibility of the user, and
they may be held accountable for any potential legal repercussions that arise from
unauthorized scanning activities.Terms of
Service
Context
Software Scanner
| Network Vulnerability Scanner
Audit a domain and discover its software stack including web servers, frameworks, and CMS.
Input
Operation
Result
Remaining Daily Requests 50 (guest user)
Request Timings
Target Flags
API Overview | Included with all paid subscriptions
The prompt is the main searchterm provided to the tool. This needs to be in a
format required by the tool otherwise an error may be returned. For example some tools may
require URLs while others may require IP addresses.
Some options may be required while others are optional. If there are no options, an empty
object should be provided.
The default API key is provided as an example only. This will not work in your own
applications. Register for a free account to get an API key.
Example CURL Request
Data
Data Types
Modules
Software Scanner
Token cost: 50
Enter a domain name to audit and discover its software stack including web servers, frameworks, and CMS.
Scope - Sets whether to stay in scope of the target domain or not.
Optimise - Choose an optimisation strategy to speed up the scan.