Netsparker is now Invicti
Get a demo
Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World 100% Signal 0% Noise Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World Get a demo
Get a demo
  • Product
    • Web Application Security
    • API Security
    • Features
    • DAST
    • SAST
    • SCA
    • Container Security
  • Why Us?
    • Solutions
      • Industries
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • Roles
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Comparison
    • Case studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our Story
    • In the news
    • Careers
    • Contact us
  • Resources
    • Blog
    • Live Trainings
    • Podcasts
    • Invicti Learn
    • Resource Library
    • Partners
      • Channel
      • MSSP
    • Support
Web Security Blog
  • Web Security
  • Security Labs
  • News
  • Product Docs & FAQs

Netsparker Desktop July 2016 Update – Introducing the HTTP Request Builder

Thu, 07 Jul 2016

In this July 2016 update of Netsparker Desktop, the only web vulnerability scanner with Proof-Based Scanning#TM# technology, we introduce a new penetration testing tool called the HTTP Request Builder.

Using the HTTP Request Builder to Build & Send Individual HTTP Requests

Tue, 23 May 2017

The HTTP Request Builder is a penetration testing tool that you can use to build your own HTTP requests and do manual analysis of vulnerabilities and the target’s HTTP responses. It is typically used in advanced penetration tests.

Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World

Invicti Security Corp
1000 N Lamar Blvd Suite 300
Austin, TX 78703, US

© Invicti 2025

  • RESOURCES
    • Features
    • Integrations
    • Plans
    • Case Studies
    • Changelogs
    • Invicti Learn
  • USE CASES
    • Penetration Testing Software
    • Website Security Scanner
    • Ethical Hacking Software
    • Web Vulnerability Scanner
    • Comparisons
    • Online Application Scanner
  • WEB SECURITY
    • The Problem with False Positives
    • Why Pay for Web Scanners
    • SQL Injection Cheat Sheet
    • Getting Started with Web Security
    • Vulnerability Index
    • Content Security Policy (CSP) Directives, Examples, Fixes
  • COMPARISON
    • Acunetix vs. Invicti
    • Burp Suite vs. Invicti
    • Checkmarx vs. Invicti
    • Probely vs. Invicti
    • Qualys vs. Invicti
    • Tenable Nessus vs. Invicti
  • COMPANY
    • About Us
    • Contact Us
    • Support
    • Careers
    • Resources
    • Partners
© Invicti 2025
  • Compliance
  • Legal
  • Privacy Policy
  • California Privacy Rights
  • Terms of Use
  • Accessibility
  • Sitemap

By using this website you agree with our use of cookies to improve its performance and enhance your experience. More information in our Privacy Policy.