“…Web application scanning has received considerable attention from the research community through the years, as both blackbox [25], [31], [19], [49], [22], [55], [54] and white-or grey-box [28], [14], [26], [30], [37], [60], [52], [29], [53], [45] techniques have been proposed and thoroughly evaluated. Moreover, several studies have carried out extensive comparisons between black-box vulnerability scanners [15], [20], [61], [58], [46], collectively agreeing that such tools suffer from certain core limitations, such as detecting and correctly modelling all injection points, replaying the necessary steps to perform an injection, or their inadequacy on persisting the authentication state.…”