Website Stack Fingerprinter
Detect what a website is likely built with using only public browser-visible clues (evidence-based, no scanning).
Speed up your recruitment workflow
URLCV automates CV parsing, candidate scoring, and shortlist generation — so you can place more candidates, faster.
Detect what a website is likely built with
Enter a URL or paste source material from DevTools. All analysis runs in your browser — nothing is sent to a server.
- Uses public browser-visible evidence only. No server-side crawling.
- URL fetching can be blocked by CORS. If it fails, use paste mode.
- Backend technologies are inferred, not proven.
- Missing detections do not prove absence.
- Exact versions are often unavailable. This is not a vulnerability scanner.
Fetched server-side. For more detail, also paste headers/snippets from DevTools.
Paste HTML / headers / snippets (click to expand)
Paste HTML / headers / snippets
Results
High-level suggestions based only on detected stack clues. Not attack instructions.
Website Stack Fingerprinter
Analyze a website using only public, browser-visible evidence and get an evidence-based view of the likely tech stack:
- Frontend frameworks and meta-frameworks (e.g. Next.js, Nuxt, SvelteKit)
- CMS and site platforms (e.g. WordPress, Shopify, Webflow)
- Common libraries and packages (e.g. jQuery, Tailwind, HTMX)
- Hosting / CDN clues (e.g. Cloudflare, Vercel, Netlify)
- Analytics and embedded services (e.g. GA, GTM, Hotjar, Intercom)
- Public version hints only when exposed
- Light security review hints (non-offensive, high-level)
Two input modes (because of browser restrictions)
- URL analysis — works when the page can be fetched from your browser (CORS permitting).
- Paste evidence — paste HTML, headers, script URLs, or snippets copied from DevTools when fetching is blocked.
This tool does not exploit, brute force, or scan ports. It avoids over-claiming certainty.