Searching protocol for "subdomain takeover"
Detect and assess subdomain takeover vulnerabilities.
Map bug-to-bug relationships for chaining.
Map and secure your external attack surface.