Metadata-Version: 2.0
Name: QAD
Version: 0.1.1
Summary: Quick and dirty web app scanner
Home-page: https://github.com/rascal999/qad
Author: Aidan Marlin
Author-email: aidan.marlin@gmail.com
License: GPLv3
Keywords: web application security pentest tool hacking hack audit XSS
Platform: UNKNOWN
Classifier: Development Status :: 3 - Alpha
Classifier: Intended Audience :: Developers
Classifier: Intended Audience :: Information Technology
Classifier: Topic :: Security
Classifier: License :: OSI Approved :: GNU General Public License v3 (GPLv3)
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.3
Classifier: Programming Language :: Python :: 3.4
Classifier: Programming Language :: Python :: 3.5
Classifier: Operating System :: POSIX :: Linux
Requires-Dist: IPWhois
Requires-Dist: beautifulsoup4
Requires-Dist: httplib2
Requires-Dist: requests
Requires-Dist: validators
Provides-Extra: dev
Requires-Dist: check-manifest; extra == 'dev'
Provides-Extra: test
Requires-Dist: coverage; extra == 'test'

QAD
=======================

QAD is a quick and dirty web application scanner to pick up on low hanging
fruit which may be beneficial to clients if mentioned in a pentest report.

QAD is not multi-threaded and tries to be minimalist in output. It will
process response headers, enumerate a small list of common (and potentially
interesting) directories, and will advise if login or registration forms are
available over a HTTP connection.


