W3Techs
advertise here
provided by
Q-Success
Home Technologies Reports API Sites Quality Users Blog Forum FAQ Search

Featured products and servicesadvertise here




lookup another site:
Get our site info tools or use our site info API.

Site Info - Mayhem.security

Overview of web technologies used by Mayhem.security.

Website Background

Mayhem: Automated Code and API Security Testing
Tailored for developers, Mayhem rapidly produces thousands of tests, offering actionable insights and seamless integration.

Description on Homepage

Top 10m among all websites

Popularity rank

Webflow is a hosted website building service.

Webflow

MkDocs is a static site generator that's geared towards building project documentation.

MkDocs 1.6.0
35% of sites use a newer version
used on a subdomain

JavaScript is a lightweight, object-oriented, cross-platform scripting language.

JavaScript

Static websites don't use any server-side programming language for generating web pages, but deliver fixed content which is created manually or with an offline tool.

static files
used on a subdomain

JavaScript is a lightweight, object-oriented, cross-platform scripting language, often used within web pages.

JavaScript

jQuery is a JavaScript library that simplifies HTML document traversing, event handling, animating and Ajax interaction. Originally developed by John Resig.

jQuery 2.1.3
75% of sites use a newer version

Node.js is a server-side JavaScript environment for writing network programs such as web servers, originally developed by Ryan Dahl.

Node.js

Nginx (pronounced as "engine X") is a lightweight open source web server developed by Igor Sysoev.

Nginx
used on a subdomain

Webflow is a hosted website building service.

Webflow

Amazon is a US-based e-commerce and cloud computing provider.

Amazon
used on a subdomain

Google provides various services to run on its servers.

Google
used on a subdomain
hosting info partly based on data from ipinfo.io

Amazon is a US-based e-commerce and cloud computing provider.

Amazon

Google provides various services to run on its servers.

Google
used on a subdomain

Amazon is a US-based e-commerce and cloud computing provider.

Amazon

Gmail is the email service provided by Google.

Gmail

Let’s Encrypt is a free, automated, and open certificate authority provided by the Internet Security Research Group.

Let’s Encrypt

IdenTrust is a SSL certificate authority.

IdenTrust
used on a subdomain

The CDNJS is a content distribution network, hosting a large number of JavaScript libraries, provided by CloudFlare.

CDNJS

Google Hosted Libraries (formerly called Google Libraries API) is a content distribution network for the most popular, open-source JavaScript libraries, provided by Google.

Google Hosted Libraries

jsDelivr is a service for hosting JavaScript files.

jsDelivr

Hotjar is a website analytics and feedback application.

Hotjar
used on inner pages

The Google Advertising network consists of AdSense, DoubleClick and other services.

Google Ads
used on inner pages

The Google Tag Manager is a Google service to support webmasters to manage tags on their websites.

Google Tag Manager

External Cascading Style Sheets define style rules in a separate CSS file.

External CSS

Embedded Cascading Style Sheets define a set of style rules in a <style> element within a web page.

Embedded CSS

Inline Cascading Style Sheets define style rules directly within an (X)HTML element using the style attribute.

Inline CSS

Session cookies are temporary cookies, which are deleted when the user closes the browser.

Session Cookies

Persistent cookies with an expiration time of up to 1 day.

Cookies expiring in hours

HttpOnly cookies are used only in the HTTP protocol and not in client side scripts, which may increase security.

HttpOnly Cookies

Secure cookies are used only via an encrypted connections, which may increase security.

Secure Cookies

Gzip (GNU zip) is a file compression algorithm.

Gzip Compression

A weak ETag is an HTTP header field for validation of cached web pages, that indicates a semantically equivalent page in the cache.

Weak ETag
used on a subdomain

HTTP/3 is the third major version of the HTTP network protocol, derived from the QUIC protocol.

HTTP/3

HTTP Strict Transport Security (HSTS) defines a mechanism enabling web sites to declare themselves accessible only via secure connections.

HTTP Strict Transport Security
used on a subdomain

The websites redirects visitors to its www subdomain, e.g. from example.com to www.example.com.

Default subdomain www

The websites redirects visitors to use SSL encryption, e.g. from http://example.com/ to https://example.com/.

Default protocol https

HTTP/2 is the second major version of the HTTP network protocol.

HTTP/2
used until recently

The Open Graph protocol, originally developed by Facebook, is an RDFa-based format that enables any web page to become a rich object in a social graph.

Open Graph

Twitter Cards enable automatic attachment of photos, videos and media elements to Tweets.

Twitter Cards

Generic RDFa (Resource Description Framework in attributes) is RDFa without further specialization.

Generic RDFa

HTML5 is the fifth revision of the HTML standard.

HTML5

UTF-8 (8-bit Unicode Transformation Format) is a variable-length character encoding for Unicode, which is backwards compatible with ASCII.

UTF-8

PNG (Portable Network Graphics) is a lossless compression image format, suitable to store graphics with uniformly colored areas, and originally introduced as a free, open-source successor of GIF.

PNG

JPEG (Joint Photographic Experts Group) is a lossy compression method suitable to store photographic images.

JPEG

Scalable Vector Graphics (SVG) is an XML-based vector image format.

SVG

Security industry

.security

United States
Italy
Ireland
used until recently

English

 

 

Share this page

About Us Disclaimer Terms of Use Privacy Policy Advertising Contact
W3Techs on   LinkedIn LinkedIn Mastodon Mastodon Bluesky Bluesky
Copyright © 2009-2024 Q-Success