Introduction - If you have any usage issues, please Google them yourself
Features: 1, scanning the injection point 2, SQL vulnerability scanning 3, the injection point violence Library 4, background scanning 5, MD5 brute force 6, WEB server security testing 7, password detection