We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Very buggy to run in an exploit, but I recommend doing trial and errors to see what works best.