Analyze HTTP response headers and security headers for any website. Check for proper security configurations and get recommendations.
Use dorks to find similar vulnerable configurations