Evaluate Content Security Policy headers for weaknesses and bypasses.
Parse and decompose URLs into their component parts.
Analyze password strength, entropy, and estimated crack time.
Extract indicators of compromise (IPs, domains, hashes, URLs) from text.