>> Investigation Workspace
// Notes are saved per-target...
>> Session History
// Your activity is saved locally...
>> Settings
// Theme
// Animations
>> Automated Recon Workflows
// Automated Target Profiler
// Run a sequence of essential dorks against the target...
// Target Tech-Stack Identifier
// Run dorks to identify the target's technology stack...
>> Manual Investigation Modules
// OSINT & External Tools
>> Visual Recon (Favicon Pivoting)
// Find related infrastructure by searching for the target's favicon hash on Shodan...
// Note: This is a conceptual search. For accurate results, calculate the MurmurHash3 of the favicon and search Shodan for `http.favicon.hash:<hash>`.