Probe web applications for exposed endpoints using customizable payloads
β οΈ Authorized testing only. Only scan systems you own or have explicit written permission to test.
Unauthorized scanning may violate computer-crime laws. Requests are routed through a third-party CORS proxy.