...For instance, in port scanning, single IP address won’t be scanned repeatedly
6. Performed port scanning from collected subdomains/virtual hosts IP Addresses
7. Testing the Subdomain TakeOver attack
8. Taking Screenshots of subdomains
9. Report output in #HTML or CSV format
Hidden content