📄️ Post-request scripts
Post-request scripts allow you to access and manipulate responses, set global environments for use in subsequent scans, and improve scan coverage and accuracy.
📄️ Pre-Request Scripts
Pre-request Scripts allow you to manipulate requests easily before sending them to the target. This feature helps the scanner achieve better scan coverage and provide better results.
📄️ Configure URL rewrite rules
Web application developers employ URL Rewrite Rules to hide parameters within the URL path structure. This document explains how to configure URL rewrite rules in Invicti Enterprise and Standard.
📄️ Scan time window
A Scan Time Window allows you to specify the time during which a target website can be scanned for vulnerabilities with Invicti Enterprise. Configure scanning to exclude office hours or specific time periods.
📄️ Import and Export scan sessions in Invicti Standard
Invicti Standard can import session files from Invicti Enterprise or local machine, export current scan sessions to files, and perform bulk exports to Invicti Enterprise.
📄️ Secrets
The Secrets feature allows you to store your secret value encrypted in the Invicti scanner and used as a global variable that can be dynamically referred to during the scan.
📄️ HTTP Request Builder
Use the HTTP Request Builder in Invicti Standard to create, modify, and send custom HTTP requests for manual vulnerability assessment, troubleshooting, and exploiting identified vulnerabilities.
📄️ Command line interface
Use Invicti Standard's command line interface to launch automated web application security scans, integrate with third-party applications, and automate complex scan sequences targeting multiple domains.