
deploy rem to red team any attack surface.
every line, every path, every secret
full source tree analysis. rem traces data flows through your codebase — injection points, auth bypasses, hardcoded credentials, dangerous crypto. every file she deems relevant gets read and analyzed.
your browser, her weapon
rem takes the wheel of a headless browser and attacks your web app like a human pentester. she navigates pages, fills forms, injects payloads, and discovers XSS, CSRF, SSRF, IDOR — the full OWASP top 10.
rem probes, fails, learns, returns.
each scan is a life. knowledge accumulates.