Introduction

What?

Notes on tools used for security testing application programming interfaces (APIs), and experimenting with new tools.

Why?

Assess the strength of the security controls in place.

How?