{"id":"d479e93a-fe62-4ac5-8222-6a188ae2c07c","timestamp":1779299255619,"matcher":{"static":{"/sitemap.xml":{"redirect":"/sitemap_index.xml"}},"wildcard":{},"dynamic":{}},"prerendered":["/","/pricing","/solutions/dast","/platform/cybersecurity-asset-management","/solutions/external-scanning","/platform/attack-surface-management","/solutions/website-security","/solutions/attack-surface-management","/platform/vulnerability-management","/platform/ai-security-automation","/platform/credentials-leaks-monitoring","/solutions/risk-based-prioritization","/platform/cloud-security","/rapid7-alternative","/solutions/cyber-hygiene-reporting","/solutions/api-security","/solutions/internal-scanning","/solutions/compliance","/platform/integrations","/solutions/emerging-threat-detection","/solutions/cloud-security","/qualys-alternative","/tenable-alternative","/intruder-alternative","/detectify-alternative","/customer-stories","/resources/cyber-glossary","/resources/help-center","/vulnerability-database","/Invicti-alternative","/company/about","/resources/developer-hub","/pentest-tools-com-alternative","/acunetix-alternative","/company/press","/company/careers","/company/partners","/company/contact","/book-demo","/case-studies/leading-aerospace-manufacturer","/case-studies/government-health-agency","/case-studies/emc2","/privacy","/tos","/fr/tos","/fr/pricing","/fr/privacy","/fr","/fr/book-demo","/fr/coming-soon","/coming-soon","/fr/company/about","/fr/company/press","/trust-contact","/fr/trust-contact","/fr/solutions/dast","/fr/vulnerability-database","/fr/solutions/internal-scanning","/fr/pentest-tools-com-alternative","/fr/resources/cyber-glossary","/fr/platform/ai-security-automation","/fr/sitemap.xml","/fr/platform/cybersecurity-asset-management","/fr/platform/credentials-leaks-monitoring","/fr/solutions/risk-based-prioritization","/fr/resources/developer-hub","/fr/vulnerability-database/vulnerabilities","/vulnerability-database/vulnerabilities","/fr/solutions/website-security","/fr/solutions/external-scanning","/fr/solutions/cloud-security","/fr/platform/cloud-security","/fr/company/contact","/fr/company/careers","/fr/customer-stories","/fr/company/partners","/fr/solutions/compliance","/fr/qualys-alternative","/fr/resources/help-center","/fr/platform/integrations","/fr/detectify-alternative","/fr/platform/vulnerability-management","/fr/solutions/api-security","/fr/solutions/attack-surface-management","/fr/solutions/cyber-hygiene-reporting","/fr/platform/attack-surface-management","/fr/solutions/emerging-threat-detection","/fr/rapid7-alternative","/fr/Invicti-alternative","/fr/tenable-alternative","/fr/intruder-alternative","/fr/acunetix-alternative","/resources/cyber-glossary/botnet","/resources/cyber-glossary/attack-surface","/resources/cyber-glossary/cloud-security-posture-management-cspm","/resources/cyber-glossary/cross-site-scripting-xss","/resources/cyber-glossary/command-and-control-c2","/resources/cyber-glossary/common-vulnerability-exposure-cve","/resources/cyber-glossary/advanced-persistent-threat-apt","/resources/cyber-glossary/brute-force-attack","/resources/cyber-glossary/asset-discovery","/resources/cyber-glossary/credential-stuffing","/resources/cyber-glossary/cryptojacking","/resources/cyber-glossary/common-vulnerability-scoring-system-cvss","/resources/cyber-glossary/cyber-kill-chain","/resources/cyber-glossary/denial-of-service-dos","/resources/cyber-glossary/data-exfiltration","/resources/cyber-glossary/data-loss-prevention-dlp","/resources/cyber-glossary/dynamic-application-security-testing-dast","/resources/cyber-glossary/honeypot","/resources/cyber-glossary/devsecops","/resources/cyber-glossary/endpoint-detection-and-response-edr","/resources/cyber-glossary/identity-and-access-management-iam","/resources/cyber-glossary/incident-response","/resources/cyber-glossary/intrusion-detection-system-ids","/resources/cyber-glossary/intrusion-prevention-system-ips","/resources/cyber-glossary/multi-factor-authentication-mfa","/resources/cyber-glossary/mitre-attck","/resources/cyber-glossary/lateral-movement","/resources/cyber-glossary/malware","/resources/cyber-glossary/iot-security","/resources/cyber-glossary/network-access-control-nac","/resources/cyber-glossary/man-in-the-middle-attack","/resources/cyber-glossary/owasp-top-10","/resources/cyber-glossary/network-segmentation","/resources/cyber-glossary/password-spraying","/resources/cyber-glossary/patch-management","/resources/cyber-glossary/penetration-testing","/resources/cyber-glossary/privilege-escalation","/resources/cyber-glossary/phishing","/resources/cyber-glossary/public-key-infrastructure-pki","/resources/cyber-glossary/role-based-access-control-rbac","/resources/cyber-glossary/ransomware","/resources/cyber-glossary/security-awareness-training","/resources/cyber-glossary/security-information-and-event-management-siem","/resources/cyber-glossary/security-operations-center-soc","/resources/cyber-glossary/security-orchestration-automation-response-soar","/resources/cyber-glossary/social-engineering","/resources/cyber-glossary/spear-phishing","/resources/cyber-glossary/sql-injection","/resources/cyber-glossary/static-application-security-testing-sast","/resources/cyber-glossary/supply-chain-attack","/resources/cyber-glossary/threat-hunting","/resources/cyber-glossary/transport-layer-security-tls","/resources/cyber-glossary/threat-intelligence","/resources/cyber-glossary/virtual-private-network-vpn","/resources/cyber-glossary/vulnerability-management","/resources/cyber-glossary/web-application-firewall-waf","/resources/cyber-glossary/vulnerability-scanning","/resources/cyber-glossary/zero-day-vulnerability","/resources/cyber-glossary/zero-trust-architecture","/fr/case-studies/leading-aerospace-manufacturer","/fr/case-studies/government-health-agency","/fr/case-studies/emc2"]}