01Configurable analysis depths ranging from quick summaries to expert-level red team narratives
02Multi-step exploit chain construction and attack tree visualization
03Security control bypass assessment for WAF, IDS, and rate-limiting effectiveness
04Detection gap analysis to identify blind spots in logging and alerting systems
05Comprehensive DREAD scoring (Damage, Reproducibility, Exploitability, Affected Users, Discoverability)
066 GitHub stars