/*

$$$$$$$\  $$\                                               $$$$$$$\                            $$\ 
$$  __$$\ $$ |                                              $$  __$$\                           $$ |
$$ |  $$ |$$ | $$$$$$\   $$$$$$\   $$$$$$$\  $$$$$$\        $$ |  $$ | $$$$$$\   $$$$$$\   $$$$$$$ |
$$$$$$$  |$$ |$$  __$$\  \____$$\ $$  _____|$$  __$$\       $$$$$$$  |$$  __$$\  \____$$\ $$  __$$ |
$$  ____/ $$ |$$$$$$$$ | $$$$$$$ |\$$$$$$\  $$$$$$$$ |      $$  __$$< $$$$$$$$ | $$$$$$$ |$$ /  $$ |
$$ |      $$ |$$   ____|$$  __$$ | \____$$\ $$   ____|      $$ |  $$ |$$   ____|$$  __$$ |$$ |  $$ |
$$ |      $$ |\$$$$$$$\ \$$$$$$$ |$$$$$$$  |\$$$$$$$\       $$ |  $$ |\$$$$$$$\ \$$$$$$$ |\$$$$$$$ |
\__|      \__| \_______| \_______|\_______/  \_______|      \__|  \__| \_______| \_______| \_______|

This is a dedicated pages for Vulnerability Testing . 

It is meant to be used by security professionals and bug bounty hunters.


- Contact  >>  QQ OTM5Njk0NA==    

*/