saas-attacks
saas-attacks copied to clipboard
Big expansion on recon technique examples
We currently have mostly 1-2 examples for each technique demonstrating it is valid to a minimum of a proof of concept level. Going forwards, the more examples we have the better.
As a first step of that, we'll look to significantly expand the number of examples for some of the recon techniques. This is because many of these are relatively simple to check, somewhat consistent across different apps and it's obviously also the first phase in the kill chain.