webapplication
Simulate attackers
static code analysis
Discovery of security vulnerabilities
Manual input
Manual testing
feedback
Analyze web applications
Running web applications
dynamic test
source code