@bagder Just curious how it's that much different than, say, using any other autonomous mass scanner. What makes it any better or worse, than, say metasploit or any other dozens of autonomous tool suites routinely used in pentesting? Seems a little hypocritical to selectively single out something that's only SLIGHTLY more automated. It completely ignores the fully autonomous software that protects the internet every day, too. Explain that to this non hacker, could ya? What's the difference?