Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Document tools used forĀ 

  • Static and dynamic vulnerabilities in source code and binary depenedncies
  • Penetration testing
  • Security hardening
  • ...