OP 05 June, 2020 - 04:26 PM
It takes a target domain as an input and performs reconnaissance on it and gives out - Screenshots, javscripts from wayback machine, endpoints, subdomains, Valid paths, xss parameters, check for live ports , check for Subdomain takeover , etc..
![[Image: TfFpGr6.jpg]](https://i.imgur.com/TfFpGr6.jpg)
![[Image: MIB3cJi.gif]](https://i.imgur.com/MIB3cJi.gif)
LIKE+REP IF YOU WANT ME TO BE A CONTRIBUTOR
DONATE BTC - 1HdbjkNwgK24XHJKw8ggB2ZL7GNC6W7z9V
![[Image: TfFpGr6.jpg]](https://i.imgur.com/TfFpGr6.jpg)
![[Image: MIB3cJi.gif]](https://i.imgur.com/MIB3cJi.gif)
LIKE+REP IF YOU WANT ME TO BE A CONTRIBUTOR
DONATE BTC - 1HdbjkNwgK24XHJKw8ggB2ZL7GNC6W7z9V