Inspiration
Our inspiration/motivation was the bad UX and lack of enhanced functionality in common pentesting/port scanning tools such as Metasploit and Burpsuite.
What it does
It provides a simple, declarative, and modern interface for testing the security of modern web applications.
How we built it
(Look at "Architecture" in Project Media); we also used Figma for our presentation/prototyping
Challenges we ran into
Initially, we had some issues with our RESTful API (integrating CLI output with it), but we have resolved this.
Accomplishments that we're proud of
Dockerization, deployment to app-engine and compute-engine, as well as the amount of Figma prototypes we finished and revised in our allowed time.
What we learned
GCP, Figma, Docker, pentesting, etc
What's next for SECR
- Freemium model, with affordable enhanced functionality
- Increase the parameters of testing to a wider array of use cases and possible vulnerabilities
- Vulnerability discovery and automated upload reports (could leverage GPT-3)
- Deployment in many different formats (CI/CD workflow integration, Docker Container, etc)

Log in or sign up for Devpost to join the conversation.