
Table of Contents
I. Introduction
- Overview
- Key Features
- Use Cases
II. Getting Started
- Theory
- Manager
- Defender
- Installation
- Docker
- Manual
- Configuration
- Manager
- Defender
- Usage
III. Architecture
- Core Technologies
- System Diagram
- Database
IV. GUI & API
- Managements
- Decisions
- Defenders
- Groups
- Rules
- Targets
- Wordlists
- Audits
- Fingerprints
- Reports
- Utilities
- Assets
- Tags
- Privileges
- Permissions
- Policies
- Tokens
- Users
V. Additional Information
- Reports
- Contact
I. Introduction:
II. Getting started:
III. Architecture:
IV. GUI & API:
V. Additional information: