# Introduction

It is primarily focused in penetration testing, but can be used for scanning, post-exploitation, information gathering, and exploit development.&#x20;
