Benchmark Scanners against
Vulnerable Apps

Register known vulnerable applications and corresponding vulnerabilities, then submit scan results from different scanners to evaluate their accuracy.