Kaizen2977 / Burp-Loader-Linux
Install Burpsuite pro in Linux OS
β14Updated last year
Alternatives and similar repositories for Burp-Loader-Linux:
Users that are interested in Burp-Loader-Linux are comparing it to the libraries listed below
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.β46Updated last year
- PHP CGI Argument Injection (CVE-2024-4577) RCEβ20Updated 8 months ago
- Tool for automate bug hunting process π --> πβ39Updated 8 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.β134Updated 6 months ago
- Tool for bypassing logins vulnerable against SQL injectionβ45Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualβ¦β60Updated 3 years ago
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The β¦β40Updated 3 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSRβ¦β121Updated 7 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectβ¦β75Updated 7 months ago
- A tool for automatically change the Tor IP address over time.β79Updated 2 weeks ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate dataβ55Updated last year
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools thβ¦β51Updated 4 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modulβ¦β60Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bountyβ39Updated 7 months ago
- Bug Bounty ultimate toolβ19Updated 5 months ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated toolβ42Updated 8 months ago
- Information Gathering tool for a Website or IP addressβ46Updated last year
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.β66Updated 7 months ago
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploitedβ16Updated 7 months ago
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logsβ37Updated 3 years ago
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ24Updated 3 years ago
- Hacking with PasteJacking techniqueβ22Updated 9 months ago
- RtspBruter is a RTSP(Real Time Streaming Protocol) bruteβ28Updated 4 years ago
- Ultimate Google Dork Lists OSWP top 10β55Updated 8 months ago
- All in one web Recon appβ39Updated 10 months ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search β¦β36Updated 4 months ago
- An OSINT focused tool made with Nodejs!β92Updated 2 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoCβ63Updated 11 months ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.β20Updated this week
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persistβ¦β92Updated 8 months ago