The following graph illustrates the control flow of the playbook: the green path represents the normal flow where conditions are true, while the red path indicates the flow when conditions are false.
Defines the scope of a penetration test by identifying target assets and attack vectors.
Enter a URL to find related pages based on patterns of cookies, storage and documents.
info It only takes us on average 3 days to add new feature requests
Search for a domain name to find its DNS records, IP address, and mail servers. We also check for common DNS misconfigurations and security issues.
info It only takes us on average 3 days to add new feature requests
Enter a domain name to find all its subdomains by enumerating DNS records.
info It only takes us on average 3 days to add new feature requests
Enter a URL to find out what a website is built with including its web technology stack, web server, and web framework.
info It only takes us on average 3 days to add new feature requests
Enter a URL to check the backlinks of a website and see who is linking to it.
info It only takes us on average 3 days to add new feature requests