πŸ” Vulnerability Scanner

Probe web applications for exposed endpoints using customizable payloads

⚠️ Authorized testing only. Only scan systems you own or have explicit written permission to test. Unauthorized scanning may violate computer-crime laws. Requests are routed through a third-party CORS proxy.
Payloads will be appended directly to this URL
0 payloads
One payload per line β€” duplicates and blank lines are ignored automatically
5
Preparing…
0%