Netsparker is now Invicti
Get a demo
Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World 100% Signal 0% Noise Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World Get a demo
Get a demo
  • Product
    • Web Application Security
    • API Security
    • Features
    • DAST
    • SAST
    • SCA
    • Container Security
  • Why Us?
    • Solutions
      • Industries
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • Roles
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Comparison
    • Case studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our Story
    • In the news
    • Careers
    • Contact us
  • Resources
    • Blog
    • White Papers
    • Webinars
    • Podcasts
    • Invicti Learn
    • Resource Library
    • Partners
      • Channel
      • MSSP
    • Support
Web Security Blog
  • Web Security
  • Security Labs
  • News
  • Product Docs & FAQs
Invicti Security

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding

Thu, 15 May 2025

Vibe coding is one of the hottest trends in software right now, promising to radically change how we build apps by using natural language instead of traditional programming. But beyond the buzz, what does it actually mean and what are the risks?

Read more

Collision Based Hashing Algorithm Disclosure

Wed, 10 Jan 2018

This detailed article explains how you can use the Collision Based Hashing Algorithm Disclosure method to check if the target web application uses the weak SHA-1 hashing algorithm to hash the users’ passwords.

The Advantage of Heuristic Over Signature Based Web Vulnerability Scanners

Thu, 29 Jun 2017

This article explains how both the heuristic and signature based web application security scanners work. It also explains the pros and cons of both types of scanners.

Infosecurity Europe 2017 Tech Talk: Scaling-Up & Automating Web Application Security

Tue, 20 Jun 2017

Watch our CEO’s tech talk about the challenges of automating and scaling-up web application security. Ferruh delivered this presentation at Infosecurity Europe 2017, one of Europe’s biggest IT security conferences.

XSS, CSRF & Other Vulnerabilities in CubeCart Web Application

Fri, 12 Jan 2018

This article explains in details the various vulnerabilities Netsparker’s security researchers identified in CubeCart, an open source ecommerce solution.

Demo: Exploiting a Blind XSS & Second Order SQL Injection

Thu, 11 May 2017

How you can disable directory listing on your web server—and why you should

Wed, 01 May 2024

Preventing Cross-site Scripting Vulnerabilities When Developing Ruby on Rails Web Applications

Wed, 19 Apr 2017

This article uses examples to explain how to develop secure web applications in Ruby on Rails that are not vulnerable to cross-site scripting vulnerabilities.

Course: Introduction to Web Application Penetration Testing

Mon, 22 May 2017

This detailed course explains the different stages of a thorough web application security and penetration test. Using both videos and slides, this course is ideal for anyone who would like to get started with web application security and using an automated web vulnerability scanner.

What is an open redirection vulnerability and how to prevent it

Fri, 19 Jul 2019

How I Hacked my Smart TV from My Bed via a Command Injection

Thu, 06 Apr 2017

This article explains how I was able to exploit a command injection vulnerability in my Smart TV and use Netcat to gain remote shell access on the TV set.

Ferruh Talks About Netsparker Hawk on Paul’s Security Weekly #506

Tue, 23 May 2017

In episode #506 of Paul’s Security Weekly, our founder and CEO Ferruh Mavituna explains how Netsparker Hawk detects out-of-band vulnerabilities in web applications.

Information Disclosure Vulnerability, Attacks, and Example

Wed, 19 Jun 2019
< 1 … 35 36 37 38 39 40 41 … 44 >
Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World

Invicti Security Corp
1000 N Lamar Blvd Suite 300
Austin, TX 78703, US

© Invicti 2025

  • RESOURCES
    • Features
    • Integrations
    • Plans
    • Case Studies
    • Changelogs
    • Invicti Learn
  • USE CASES
    • Penetration Testing Software
    • Website Security Scanner
    • Ethical Hacking Software
    • Web Vulnerability Scanner
    • Comparisons
    • Online Application Scanner
  • WEB SECURITY
    • The Problem with False Positives
    • Why Pay for Web Scanners
    • SQL Injection Cheat Sheet
    • Getting Started with Web Security
    • Vulnerability Index
    • Content Security Policy (CSP) Directives, Examples, Fixes
  • COMPARISON
    • Acunetix vs. Invicti
    • Burp Suite vs. Invicti
    • Checkmarx vs. Invicti
    • Probely vs. Invicti
    • Qualys vs. Invicti
    • Tenable Nessus vs. Invicti
  • COMPANY
    • About Us
    • Contact Us
    • Support
    • Careers
    • Resources
    • Partners
© Invicti 2025
  • Compliance
  • Legal
  • Privacy Policy
  • California Privacy Rights
  • Terms of Use
  • Accessibility
  • Sitemap

By using this website you agree with our use of cookies to improve its performance and enhance your experience. More information in our Privacy Policy.