http://qxr2st5oqf3pvxxgccy4qn3ybsrtpp4sh3bafvxsrzzbmfw76cqoghid.onion/2024/07/12/hacking-instructions
In general it’s a hard and long process, running the tools, analyzing the results, understanding the results, drawing conclusions, restarting the tools, re-analyzing and many hours in between while the tools are running to spit out more results for analysis. Analyzing and reviewing tons of data and then checking whether potentially detected vulnerabilities are real and exploitable, only to find out in the end that they are not.