rustscan -a $IP --ulimit 5000 -- -sC -sV | tee ports.scan
ffuf -u http://$IP/FUZZ -w /usr/share/wordlists/SecLists/Discovery/Web-Content/big.txt
gobuster dir -u http://$1/ -w /usr/share/wordlists/SecLists/Discovery/Web-Content/big.txt
ffuf -u http://$subdomain/ -w /usr/share/wordlists/SecLists/Discovery/DNS/subdomains-top1million-5000.txt -H "Host: FUZZ.${subdomain}"