Intelligence gathering and threat landscape analysis
Network topology visualization and asset discovery
Service enumeration and surface analysis
Security posture enhancement and hardening