01Detects sensitive data exposure issues
02Tests for JWT vulnerabilities, authentication bypass, and weak authentication mechanisms
03Identifies SQL injection, XSS, and other injection vulnerabilities
04Evaluates rate limiting bypass and DDoS vulnerabilities
05Analyzes HTTP headers for security best practices
062 GitHub stars