Syhunt [Code]


Dive into your source code and locate flaws

Syhunt Code enables developers and QA (Quality Assurance) testers to automatically scan any kind of application source code for potential security vulnerabilities. Pin point with this tool the exact lines of the code that need to be patched.

View Datasheet

700+30+
Vulnerability ChecksVulnerability Categories Covered (View All)


Vulnerability Scanner

Syhunt Code has been especially designed to scan web applications for various types of issues, such as Cross-Site Scripting (XSS), File Inclusion, SQL Injection, Remote Command Execution and weak validation. By automating the process of reviewing the web application's code, Syhunt's code scanning functionality can make the life of QA testers easier, helping them quickly find and eliminate security vulnerabilities from web applications.

Deep Diving Tool

Syhunt Code allows you to go over every detail of the app to find vulnerabilities. By identifying key areas of the code, such as key HTML tags, JavaScript, XHR requests, entry points and interesting keywords, Syhunt Code can also help auditors perform code reviews better, faster and more efficiently.

Hybrid Scanner Integration

When used from within Syhunt Hybrid, Syhunt Code can also perform source code scans that are complementary to its dynamic scans. Syhunt Hybrid scans your application's source code first, then tries to remotely confirm its flaws. Supported languages include ASP, Java, JS, Lua, Perl, PHP & Python.

Learn more



Integrations with other systems

Syhunt Code integrates with Jenkins for Continuous Integration (CI), JIRA and GitHub for issue tracking, and F5 BIG-IP Application Security Manager (ASM) for virtual vulnerability patching.

CVSS Support

Syhunt Code comes with full support for the Common Vulnerability Scoring System, an industry standard designed to convey vulnerability severity and help determine urgency and priority of response. When a report is generated, vulnerabilities are sorted by default based on their CVSS3 score.

Learn more

MEAN Stack Coverage

Syhunt Code analyzes the source code of web applications built using the MEAN stack - this includes a large number of vulnerability checks tailored for MongoDB, Express.js, Angular (v2 and higher), AngularJS, Node.js, Koa.js, jQuery, client-side and server-side JavaScript.

Learn more


Audit & inspect web apps faster and deeper


Supported Languages

ASP Classic (VBScript & JavaScript)
ASP.Net (C# & VB.Net)
Java (JEE / JSP)
JavaScript (Client and Server-Side, Node.js, Angular, AngularJS, Express.js & Koa.js)
Lua (mod_lua, CGILua & Lua Pages)
Perl
PHP
Python (CGI, Django, mod_python & WSGI)
TypeScript (Angular)

Check for all kinds of vulnerabilities

CheckCWE
Command ExecutionCWE-78
SQL InjectionCWE-89
SQL Injection (Functional)
SQL Injection (Object-Oriented)
SQL Injection (Hibernate/HQL)
File InclusionCWE-98
Local File Inclusion
Remote File Inclusion
Cross-Site Scripting (XSS)CWE-79
Weak XSS ValidationCWE-79
Hidden Entry Points
Web-Backdoors
Debug Parameters
NoSQL Injection 
Unvalidated RedirectsCWE-601
Arbitrary File ManipulationCWE-73
HTTP Response SplittingCWE-113
LDAP InjectionCWE-90
XML External Entity (XXE) InjectionCWE-827
XPath InjectionCWE-643
Server-Side Request ForgeryCWE-918
Log ForgingCWE-117
Information DisclosureCWE-497
Common Form Weaknesses 
Weak Password Hashing 

We have identified significant vulnerabilities [using Syhunt Code]. Several products we reviewed were found to have various types of injection vulnerabilities, arbitrary file disclosure and access issues and tons of XSS problems.

Brent Huston, CEO, MicroSolved, Inc.

We have used Syhunt for years because it`s been the best web app security assessment tool out there. Rapidly updated to cover new vulnerabilities as they arise and very easy to use. more

Robert Davies, CEO, Stealth-ISS

More Quotes


Syhunt Code runs under any modern Windows version from Windows 7 through 10 (Specs)