Just want to know lil about the data ... like did you usually exploit a vuln or do you usually look for the exposed Ip's and endpoints.
or Do you use stealer Logs data ?? i juste want to make my own methodology .. juste push me in the right direction,.=.