Past the OWASP Leading ten, software pen tests also look for less prevalent security flaws and vulnerabilities That could be special into the app at hand.Employing facts archive Internet sites, government records and membership sites like Hoover's or LexisNexis to assemble info Which might be harder to seek out in strictly general public sources.