IDENTIFYING SECRET VULNERABILITIES: YOUR GUIDE TO VULNERABILITY SCANNERS