: Some versions allow users to log into the verified email accounts directly within the software interface.

: It specifically targets IMAP and POP3 protocols. These legacy protocols are often targeted because they may lack the advanced rate-limiting and multi-factor authentication (MFA) checks found on modern web login portals.

: The tool can process millions of credentials to identify "valid" accounts.