We cover OWASP Top 10 . That means we find a wide variety of flaws, including SQL, LDAP, XPATH and NoSQL injections, Cross Site Scripting flaws, broken session management, remote code and command execution, malware, etc
What scanners are you using, and what is the difference between using them myself versus using your website?
We integrate on-premise, open-source and tailor-made the scanners in the same project (except WPScan because it sucks), we optimize their tests times, executing them in less than an hour, and finally we eliminate most of the duplicate and false positives, so you can see the results in a better UX.
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
Disclaimer: You are the CEO of Hackmetrix, therefore this is pretty biased
I'm wondering what exactly are you checking on the web application.
What exactly are you testing here?
Known vulnerabilities on CMS (Ex: WpScan)? Generic vulnerabilities in the page forms and inputs?
What scanners are you using, and what is the difference between using them myself versus using your website?
Hi Antony
Thanks for your questions!
We cover OWASP Top 10 . That means we find a wide variety of flaws, including SQL, LDAP, XPATH and NoSQL injections, Cross Site Scripting flaws, broken session management, remote code and command execution, malware, etc
What scanners are you using, and what is the difference between using them myself versus using your website?
We integrate on-premise, open-source and tailor-made the scanners in the same project (except WPScan because it sucks), we optimize their tests times, executing them in less than an hour, and finally we eliminate most of the duplicate and false positives, so you can see the results in a better UX.