name-logo.png


Table of Contents

I. Introduction

  1. Overview
  2. Key Features
  3. Use Cases

II. Getting Started

  1. Theory
    1. Manager
    2. Defender
  2. Installation
    1. Docker
    2. Manual
  3. Configuration
    1. Manager
    2. Defender
  4. Usage

III. Architecture

  1. Core Technologies
  2. System Diagram
  3. Database

IV. GUI & API

  1. Managements
    1. Decisions
    2. Defenders
    3. Groups
    4. Rules
    5. Targets
    6. Wordlists
  2. Audits
    1. Fingerprints
    2. Reports
  3. Utilities
    1. Assets
    2. Tags
  4. Privileges
    1. Permissions
    2. Policies
    3. Tokens
    4. Users

V. Additional Information

  1. Reports
  2. Contact

I. Introduction:

II. Getting started:

III. Architecture:

IV. GUI & API:

V. Additional information: