Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
MailHog is a streamlined email testing tool designed for developers, taking inspiration from MailCatcher to simplify installation. By configuring your application to use MailHog for SMTP delivery, you can effortlessly view messages through its web interface or retrieve them via the JSON API. Additionally, it allows for the optional release of messages to real SMTP servers. You can explore the MailHog libraries to find various client libraries available for integration. The tool features an ESMTP server that adheres to RFC5321 standards and supports SMTP AUTH (RFC4954) alongside PIPELINING (RFC2920). Users can access a web interface to examine messages in different formats, including plain text, HTML, or raw source, while also supporting RFC2047 encoded headers. Real-time updates are facilitated through EventSource, enabling immediate visibility of new messages. Furthermore, MailHog includes a Chaos Monkey feature for testing failure scenarios, ensuring robustness in applications. For detailed message management, an HTTP API is provided to list, retrieve, and delete messages, with comprehensive documentation available for both APIv1 and APIv2. Security is enhanced with HTTP basic authentication for the MailHog UI and API, and it also supports multipart MIME, allowing users to download individual MIME parts. The system utilizes in-memory message storage, along with options for MongoDB and file-based storage to ensure message persistence, making it a versatile choice for developers. Overall, MailHog is a comprehensive solution that streamlines the email testing process while offering a range of features for effective message management.
Description
Nikto is a web server scanner that is open-source and licensed under the GPL, designed to conduct thorough examinations of web servers for a variety of issues, including the detection of over 6700 potentially harmful files and programs. It assesses outdated versions across more than 1250 server types and identifies version-specific vulnerabilities on over 270 different servers. Additionally, Nikto evaluates server configurations by checking for the existence of multiple index files and various HTTP server options, while also attempting to recognize the web servers and software that are installed. The items and associated plugins for scanning are regularly updated, with options for automatic updates available. Unlike stealth tools, Nikto operates quickly and is likely to leave traces in log files or be detected by intrusion prevention systems. Nonetheless, it includes features for LibWhisker's anti-IDS methods for those who wish to test their systems. It’s important to note that while many checks may uncover security issues, not every scan result indicates a problem. Ultimately, Nikto serves as a valuable resource for administrators looking to secure their web servers effectively.
API Access
Has API
API Access
Has API
Integrations
ArmorCode
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
MailHog
Website
github.com/mailhog/MailHog
Vendor Details
Company Name
CIRT.net
Website
cirt.net/Nikto2
Product Features
Email Testing
A/B Testing
Accessibility Testing
DMARC Analytics
Deliverability Rates
HTML Validation
IP Blacklist Checking
Improvement Recommendations
Pre-Send Email Testing
Preview Across Browsers & Devices
Reporting / Analytics
Sender Reputation Scoring
Spam Testing
Product Features
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection