Install Burpsuite pro in Linux OS
☆17Mar 24, 2024Updated 2 years ago
Alternatives and similar repositories for Burp-Loader-Linux
Users that are interested in Burp-Loader-Linux are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Oct 10, 2020Updated 5 years ago
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 4 years ago
- Cheap Fake Driver License , #Editable_Temporary_Drivers_License_Template , Fake_Driver_License_Picture_Template , Make Fake Driver Licens…☆15Feb 2, 2020Updated 6 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆19Oct 28, 2023Updated 2 years ago
- This tool is best for you In order to download the best penetration testing tools It will save you a lot of time [FOR KALI LINUX just]☆14Sep 20, 2017Updated 8 years ago
- maltego osint tool on kali linux☆15Mar 7, 2017Updated 9 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- ☆13Sep 15, 2024Updated last year
- Malware that TeamTNT found and removed.☆14Nov 27, 2020Updated 5 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- Connect to a GitHub Action runner via SSH through an ngrok tunnel.☆15Dec 5, 2024Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.☆19Jul 3, 2024Updated last year
- ☆13Jun 10, 2023Updated 2 years ago
- CVE-2021-40444☆66Dec 19, 2021Updated 4 years ago
- A simple multithreaded SSH credential tester.☆14Jun 6, 2025Updated 9 months ago
- Big Dorker☆14Oct 18, 2024Updated last year
- Ethical Hacking - A Hands-On Approach to Ethical Hacking [Video], published by Packt☆14May 10, 2023Updated 2 years ago
- Deploy Vulnerable Lab to Learn Pentest using Bash Script☆18May 2, 2023Updated 2 years ago
- Bash script to generate reverse shell payloads☆19Sep 9, 2023Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆76May 9, 2023Updated 2 years ago
- Kerberos parser written in rust with nom☆15Nov 24, 2025Updated 4 months ago
- Command Line Interface of ViPER Pen Testing tool.☆14Nov 26, 2016Updated 9 years ago
- This repository is a place to leave and share notes on Hak5 scripts - credit to the many authors for sharing great content.☆14Nov 27, 2021Updated 4 years ago
- coremail address list export☆12Sep 9, 2021Updated 4 years ago
- Searches for the carrier unlock code for the Samsung Galaxy S 4G in a fast and easy way☆13May 18, 2015Updated 10 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.0☆13Jan 17, 2020Updated 6 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Sep 20, 2023Updated 2 years ago
- Hybrid Botnet over TOR targeting Linux machines☆11Aug 1, 2021Updated 4 years ago
- Exfiltrate all saved Wi-Fi passwords from a Windows PC☆13Sep 14, 2023Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- AXIS Botnet☆17May 16, 2024Updated last year
- Generates Fake Data from fakenamegenerator.com☆14May 22, 2023Updated 2 years ago
- ☆18Dec 19, 2025Updated 3 months ago
- a medium scraper that you need.☆18Nov 11, 2025Updated 4 months ago
- Tuning suite for Nissan/Infiniti vehicles with ECUs containing a SuperH 705x MCU☆17Jun 18, 2017Updated 8 years ago
- ☆21May 1, 2021Updated 4 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated last month