#IICSG2019 Conference Insights Track
Day 2 (20 Jun 2019)
@ Breakout Room 2
We are going to talk about how to automate 95% of the actions that need to be carried out during the exploration process for bug bounty or pentest, as well as some of the vulnerabilities that for some reason are not checked by modern scanners or require the use of one-check utilities. We also made a single interface to manage this process. We will talk about how to build a modular and easily extensible architecture for the command center to automate the process of finding vulnerabilities.