- Generates vulnerability reports in various formats
- It can suspend and resume a scan or an attack
- Fast and easy way to activate and deactivate attack modules
- Support HTTP and HTTPS proxies
- It allows restraining the scope of the scan
- Automatic removal of a parameter in URLs
- Import of cookies
- It can activate or deactivate SSL certificates verification
- Extract URLs from Flash SWF files