Kaizen2977 / Burp-Loader-Linux
Install Burpsuite pro in Linux OS
☆14Updated last year
Alternatives and similar repositories for Burp-Loader-Linux:
Users that are interested in Burp-Loader-Linux are comparing it to the libraries listed below
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆132Updated 5 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- Red Teaming tools and techniques☆50Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆57Updated 11 months ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- Check out this JavaScript code that extracts URLs from a web page and linked scripts! Perfect for web scraping and penetration testing☆18Updated 8 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆38Updated 7 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆43Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆31Updated 10 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 8 months ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆37Updated 2 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆24Updated 3 years ago
- ☆20Updated 6 months ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆72Updated last week
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 6 months ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆20Updated 7 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 6 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆92Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆38Updated 6 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆38Updated last year
- Do bug hunting with One-Line script and get bounty☆17Updated last year
- All in one web Recon app☆40Updated 9 months ago
- Bug Bounty ultimate tool☆19Updated 4 months ago
- Tool to create XSS PDF files☆47Updated 9 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆43Updated 8 months ago
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆24Updated 3 years ago