Lighting up Gremwells MagicTree with Arachni Data

Every pen-tester – I am using this term both for people who really do pen-tests as for people who do vulnerability assessments- has the same problem: after some days of twiddling with tools, home-grown scripts, diving into attack techniques and research into specific vulnerabilities, you have to write a report.  For those doing »