📄️ Attack Possibilities Node
Learn about the Attack Possibilities node in Invicti, which lists the possible number of attacks per engine during scanning.
📄️ Form Validation Errors Node
Learn about the Form Validation Errors node in Invicti, which identifies form validation errors and the attack surface in your web application.
📄️ Proofs Node
Learn about the Proofs node in Invicti, which provides demonstrable proof of identified vulnerabilities through safe exploitation.
📄️ Software Composition Analysis (SCA) Node
Learn about the Software Composition Analysis (SCA) node in Invicti, which identifies all third-party components and their vulnerabilities in your web application.
📄️ Invicti Shark Node
Learn about the Invicti Shark node in Invicti, which lists all information reported by Invicti Shark (IAST) for your web application.
📄️ Interesting Headers Node
Learn about the Interesting Headers node in Invicti, which identifies unusual and customized HTTP headers in your web application.
📄️ SSL Node
Learn about the SSL node in Invicti, which identifies SSL configurations, protocols, and ciphers supported by your web server.