| skipped 12 lines |
13 | 13 | | - Shadow Permissions Enumeration & IAM detailed scanner |
14 | 14 | | - Automation for Service Principles Exploit |
15 | 15 | | - App Service Attack surface detection |
16 | | - | - Token Converat automation for local/remote identities (i.e., Managed Identity) |
| 16 | + | - Token Convert automation for local/remote identities (i.e., Managed Identity) |
17 | 17 | | - Ability to connect remote/local identities |
18 | 18 | | - ARM Template Quick Analysis |
19 | 19 | | |
| skipped 18 lines |