HconSTF - improvements and user feedback survey
Bug bounty hunter
Which version of HconSTF you are using ?
HconSTF 0.5 Prime
HconSTF 0.4 Freedom
(Chromium base) HconSTF 0.1 beta
Which platform binary you use of HconSTF?
Do you use the HconSTF-Cleaner ?
Yes - all the time
Yes - sometimes
No - Not at all
Do you use HconSTF in combination with any other webproxy ?
yes with burp suite
Yes with ZAP (zend attack proxy)
NO i just use HconSTF only
Which type of distribution binary you will prefer?
Portable - no need to install
make both as available options- setup and portable
Which version of HconSTF you want to see next ?
Fire base - based on Firefox
Aqua base - based on Chromium
Both of the above
Do you need full Tor or other anonymization techniques in HconSTF ?
Yes - with TOR
Yes - with I2P
Yes - with both TOR and I2P
which feature of HconSTF you use the most ?
Automated scanners for Xss , sqli and other techniques
Search features - Osint, Doxing, Cyber spying
Cryptographic features - Hashing, encoding/decoding, Hash Identification, cracking
IDB - Ready to use Attack payload strings
Mix of all of the above
For what reason you use HconSTF?
For doing realworld webapp pentest
For Training students on webapp pentest
If other than please specify:
Feature that you want to see in the next HconSTF release ?
More documentation and tutorials
More automated scanners
More OSINT features for Digital investigations and cyber spying
More exploitation features
Improved user interface
If any other please specify:
Are you interested to join a webapp Pentesting course based on HconSTF ?
Yes - if it is FREE
Yes - even if with a small fee
NO not at all
Please specify any other views or ideas or features requests you have:
Copyright © Hcon.in 2010-2014