head	1.1;
access;
symbols
	RELEASE_8_3_0:1.1
	RELEASE_9_0_0:1.1
	RELEASE_7_4_0:1.1
	RELEASE_8_2_0:1.1
	RELEASE_6_EOL:1.1
	RELEASE_8_1_0:1.1
	RELEASE_7_3_0:1.1
	RELEASE_8_0_0:1.1
	RELEASE_7_2_0:1.1
	RELEASE_7_1_0:1.1
	RELEASE_6_4_0:1.1
	RELEASE_5_EOL:1.1
	RELEASE_7_0_0:1.1
	RELEASE_6_3_0:1.1
	PRE_XORG_7:1.1
	RELEASE_4_EOL:1.1
	RELEASE_6_2_0:1.1
	RELEASE_6_1_0:1.1
	RELEASE_5_5_0:1.1
	RELEASE_6_0_0:1.1
	RELEASE_5_4_0:1.1
	RELEASE_4_11_0:1.1;
locks; strict;
comment	@# @;


1.1
date	2004.11.11.21.10.04;	author pav;	state Exp;
branches;
next	;


desc
@@


1.1
log
@Add spike-proxy, a professional-grade tool for looking for application-level
vulnerabilities in web applications. SPIKE Proxy covers the basics, such as SQL
Injection and cross-site-scripting, but it's completely open Python
infrastructure allows advanced users to customize it for web applications that
other tools fall apart on.

PR:		ports/69943
Submitted by:	Yonatan <Yonatan@@Xpert.com>
@
text
@Not all web applications are built in the same ways, and hence, many
must be analyzed individually. SPIKE Proxy is a professional-grade
tool for looking for application-level vulnerabilities in web
applications. SPIKE Proxy covers the basics, such as SQL Injection and
cross-site-scripting, but it's completely open Python infrastructure
allows advanced users to customize it for web applications that other
tools fall apart on.

WWW: http://www.immunitysec.com
@
