Today, we’d like to continue a series of articles in which we’ll examine new promising tools and learn how to use them, as well as their advantages and disadvantages. We understand and respect your limited time, therefore we created a specific research article with nothing superfluous only for you!Authors: Nikita Kirillov, officercia.ethThis series will only cover aspects of auditing, bug bounty & white-hacking that are not covered elsewhere. We will additionally look into Semgrep rules for s...