Kaizen2977 / Burp-Loader-Linux
Install Burpsuite pro in Linux OS
☆14Updated 5 months ago
Related projects: ⓘ
- ☆84Updated this week
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆49Updated 3 years ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆37Updated last year
- XSS Rocket is written by Black Hat Ethical Hacking with the help of #ChatGPT as experimentation, with a lot of hours spent modifying the …☆92Updated 2 weeks ago
- Tool to create XSS PDF files☆32Updated 3 months ago
- Redirect All Traffic Through Tor Network For Kali Linux☆122Updated 2 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆98Updated last month
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated last year
- Bypass 403☆110Updated last month
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆67Updated last year
- Backdoor PHP shell script.☆57Updated 2 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆55Updated 5 months ago
- DorkScraper is a simple tool written in Python to extract all the urls that appear when using a Google Dork.☆37Updated last month
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆46Updated 6 months ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆48Updated 4 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆118Updated 2 weeks ago
- Boost website hits by generating requests from multiple proxy IPs.☆49Updated 6 months ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆91Updated 8 years ago
- Simple script for generating dorks list for SQL injection☆21Updated 2 years ago
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆71Updated 2 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆12Updated 2 years ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆86Updated 2 months ago
- GoogleDorker an advance level of cli based Google Dorking Tool☆48Updated 11 months ago
- Social Engineering Browser Update Attack.☆55Updated 10 months ago
- SQLMutant is a comprehensive SQL injection testing tool that provides several features to test for SQL injection vulnerabilities in web a…☆64Updated 2 weeks ago
- Create a fully undetectable backdoor with simple steps.☆72Updated 2 years ago
- A social engineering toolkit for performing smishing, and other sms attacks☆58Updated 2 months ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆48Updated 3 weeks ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆101Updated 3 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆60Updated 4 months ago