There are several tools available for web vulnerability restriction. These components are: Acunetix: Acunetix is a web application security scanner used to test permissions of web applications. This tool is designed to detect many vulnerabilities such as SQL cost, XSS, CSRF, file upload vulnerabilities, directory browsing attacks. OWASP ZAP: Zed Attack Proxy (ZAP) is an open source security testing tool. This tool is used to detect possible security vulnerabilities in web applications. It can detect many vulnerabilities such as XSS, SQL training, browser compatibility, weak authentication, direct scan attacks. Burp Suite: Burp Suite is a tool for web applications to do security testing. This tool is used to detect and patch vulnerabilities in web applications. This tool can detect many vulnerabilities such as weak authentication, XSS, CSRF, SQL master, direct scan attacks. Nikto: Nikto is an open source scanner used to detect vulnerabilities in web servers. This tool can detect many vulnerabilities for web applications running on servers. For example, directory crawl attacks, CGI vulnerabilities, open directories, malicious server attacks. Nmap: Nmap is a popular tool for network attempts and port scanning. It can also be used to output vulnerabilities in web applications. Metasploit: The Metasploit Framework is a cybersecurity tool that includes a set of tools and passwords used by cyber attackers. This tool can be used to detect vulnerabilities, perform penetration testing, and perform attacks in web applications. Arachni: Arachni is an open source scanner used to detect vulnerabilities in web applications. This tool can detect many vulnerabilities such as XSS, SQL management, browser compatibility, weak authentication, direct scan attacks. SQLMap:SQLMap is an open source SQL costing tool and comes with Kali Linux operating system. SQLMap can automatically detect SQL auto vulnerabilities in web applications and can be used to exploit these vulnerabilities. BeEF: BeEF (Browser Exploitation Framework) is an open source vulnerability exploitation tool and is used to exploit vulnerabilities in web applications. BeEF allows attackers to attack target systems via browsers. Social Engineering Toolkit (SET): SET is a tool used to perform social engineering attacks. SET allows attackers to trick users into performing malware or phishing attacks. Nessus: Nessus is a software that can exploit vulnerabilities of web applications. This scan is used to detect and fix vulnerabilities in web applications. Nessus provides a detailed report on a web server security, ranked by severity of application vulnerabilities.