📄️ BREACH Attack
Learn how to enable BREACH Attack security checks in Invicti to detect vulnerabilities in protected connections where attackers can view encrypted traffic through adaptive compression.
📄️ Forced Browsing
Learn how to configure Forced Browsing security check in Invicti to identify and access resources not linked from the web application such as backup files and admin portals.
📄️ GraphQL Library Detection
Learn how Invicti detects GraphQL endpoints and libraries in your web application and how to configure GraphQL Library Detection security check.
📄️ Identifying MongoDB injection vulnerabilities
Learn how to identify MongoDB injection vulnerabilities with Invicti using time-based and error-based detection methods.
📄️ Login Page Identifier
Learn how to configure the Login Page Identifier security check in Invicti to detect all login pages on your website by analyzing keywords and calculating weights.
📄️ Malware Analyzer
Learn how to configure the Malware Analyzer security check in Invicti Enterprise to check responses against malware.
📄️ WAF Identifier
Learn how to configure the WAF Identifier security check in Invicti to detect whether a Web Application Firewall is enabled in the target site.