<<"Spade">>
<<"Spade">>
Every input is vulnerable to XSS.
I was able to takeover the CNAME but it's not reflecting on the subdomain I want to takeover.
hey @michenriksen as the haveibeenpwned.com says that >Adding a 100 millisecond delay between requests will usually ensure this won't happen. maybe you can implement this to avoid rate limitting :D
what kind of Full StackTrace?
Here's my Latest Screenshot 
Hi @ztgrace, This is also my problem ( check Line 326 to 335 [here](https://github.com/phspade/Automated-Scanner/blob/master/scanner.sh) ). Since I'm not using nmap scan xml output instead I am using masscan output. gather...
>Are you seeing any errors or timeout messages? There is a lot of error message in my logs. Will send you the logs after the scan. Looking forward in this...
Since I and @sumgr0 always revise the code and tools. We cannot properly make this, for now, even the HTML reporting. we are changing the tools from time to time.
Hi @ethicalhackingplayground, Is it automatically inject in headers or do I need to put the option `-header` or specify any header?
Here yah go: 130.211.57.185 :) open ports: 22 and 80 goodluck. you can now close this