01Targeted API endpoint security assessments
02Identification of common flaws like SQLi, XSS, and CSRF
03Automated OWASP Top 10 vulnerability scanning
04Detailed reporting with risk ratings and remediation steps
05Guided exploitation techniques for vulnerability verification
060 GitHub stars