01Maps human-mediated authentication bypasses and help desk override vectors.
02Evaluates phishing resistance, including SPF/DKIM/DMARC and lookalike domain checks.
03Analyzes OSINT exposure across public records, social media, and code repositories.
04Identifies insecure code patterns like user enumeration and weak recovery logic.
057 GitHub stars
06Provides severity-calibrated findings with concrete remediation strategies.