🚀 Invicti Acquires Kondukto to Deliver Proof-Based Application Security Posture Management

100% Signal 0% Noise
Platform
Platform Overview
Features
CAPABILITIES
Web Application Security
ASPM
API Security
DAST
SAST
SCA
Container Security
AI-Powered AppSec
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Case Studies
Invicti Learn
Live Training
Partners
Support
Get a demo

About the Author

Sven Morgenroth

Staff Security Engineer

Sven is a Staff Security Engineer at Invicti. He lives in Germany and is passionate about web application security. He loves to explore and exploit all different kinds of real-world vulnerabilities.

MORE FROM THIS AUTHOR

How bad is a missing Content-Type header?

Read this article

APIs make XSS prevention a frontend job

Read this article

Extracting data from insecure Elasticsearch templates

Read this article

Analysis of the recent Oracle WebLogic Server remote code execution vulnerability

Read this article

Cross-site Scripting in React Web Applications

Read this article

Goodbye XSS Auditor

Read this article

How you can steal private data through CSS injection

Read this article

The Problem of String Concatenation and Format String Vulnerabilities

Read this article

DNSFS: Is it possible to use DNS as a file system?

Read this article

Discovering and hacking IoT devices using web-based attacks

Read this article

Bypassing disabled system functions

Read this article

Using Google bots as an attack vector

Read this article

The dangers of incorrect CSP implementations

Read this article

Pros and Cons of DNS Over HTTPS

Read this article

PHP Type Juggling Exploit: Vulnerability, Payloads, and Fixes

Read this article
No items found.
Security Labs

Ducks, dinosaurs, and XSS: A little knowledge is a dangerous thing in security

Read this article
No items found.
Invicti Security Corp
1000 N Lamar Blvd Suite 300
Austin, TX 78703, US
© Invicti {year}
Resources
FeaturesIntegrationsPlansCase StudiesRelease NotesInvicti Learn
Use Cases
Penetration Testing SoftwareWebsite Security ScannerEthical Hacking SoftwareWeb Vulnerability ScannerComparisonsOnline Application Scanner
Web Security
The Problem with False PositivesWhy Pay for Web ScannersSQL Injection Cheat SheetGetting Started with Web SecurityVulnerability IndexUsing Content Security Policy to Secure Web Applications
Comparison
Acunetix vs. InvictiBurp Suite vs. InvictiCheckmarx vs. InvictiProbely vs. InvictiQualys vs. InvictiTenable Nessus vs. Invicti
Company
About UsContact UsSupportCareersResourcesPartners

Invicti Security is changing the way web applications are secured. Invicti’s dynamic and interactive application security products help organizations in every industry scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.

LegalPrivacy PolicyCalifornia Privacy RightsTerms of UseAccessibilitySitemap
Privacy Policy