urlcv

Website Stack Fingerprinter

Detect what a website is likely built with using only public browser-visible clues (evidence-based, no scanning).

Speed up your recruitment workflow

URLCV automates CV parsing, candidate scoring, and shortlist generation — so you can place more candidates, faster.

Start free trial →

Detect what a website is likely built with

Enter a URL or paste source material from DevTools. All analysis runs in your browser — nothing is sent to a server.

  • Uses public browser-visible evidence only. No server-side crawling.
  • URL fetching can be blocked by CORS. If it fails, use paste mode.
  • Backend technologies are inferred, not proven.
  • Missing detections do not prove absence.
  • Exact versions are often unavailable. This is not a vulnerability scanner.
Evidence
Site A

Fetched server-side. For more detail, also paste headers/snippets from DevTools.

Paste HTML / headers / snippets (click to expand)
Enter a URL or paste evidence, then click Analyze.
Try the sample buttons above to see how it works.

Website Stack Fingerprinter

Analyze a website using only public, browser-visible evidence and get an evidence-based view of the likely tech stack:

  • Frontend frameworks and meta-frameworks (e.g. Next.js, Nuxt, SvelteKit)
  • CMS and site platforms (e.g. WordPress, Shopify, Webflow)
  • Common libraries and packages (e.g. jQuery, Tailwind, HTMX)
  • Hosting / CDN clues (e.g. Cloudflare, Vercel, Netlify)
  • Analytics and embedded services (e.g. GA, GTM, Hotjar, Intercom)
  • Public version hints only when exposed
  • Light security review hints (non-offensive, high-level)

Two input modes (because of browser restrictions)

  1. URL analysis — works when the page can be fetched from your browser (CORS permitting).
  2. Paste evidence — paste HTML, headers, script URLs, or snippets copied from DevTools when fetching is blocked.

This tool does not exploit, brute force, or scan ports. It avoids over-claiming certainty.