Skip to content

Dockerize the application and create POC of artificial vulnerability

  • Dockerized the application (certificate is automatically shared between the proxy and the testing HTTP server)
  • Added request logging
  • Added POC for header manipulation

Merge request reports

Loading