Mahmoud7Osman / Burpsuite
Activation For Burpsuite Professional By UNCIA
☆13Updated 2 years ago
Alternatives and similar repositories for Burpsuite
Users that are interested in Burpsuite are comparing it to the libraries listed below
Sorting:
- Multiple Of Scripts Useful For System Administration In Linux Servers & Distributions, Driven By a Fast Easy-to-Use Menu Script☆51Updated 3 years ago
- My First Web Page, It's About if You Should learn Binary Exploitation in 2022.☆21Updated 3 years ago
- Linux-Based Reverse Shell Builder For Linux Penetration Testers☆43Updated 3 years ago
- A Key Calculation Based Program For Data Confidentiality Over A Steganography-Like Technique Using The ROT Algorithm☆23Updated 3 years ago
- Cleny is An Interpreted Coding Language Used To Facilitate UI Structuring And Styling For CLI Based Projects☆110Updated 2 years ago
- Open source linux-based-toolkit for basic cyber security students, social engineers, linux users....☆21Updated last year
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆84Updated last year
- These are some books that will help you in your learning,I got them in my cyber security career, These books for: pentesting, programming…☆50Updated 3 years ago
- anonymous spam E-mail sender☆22Updated 4 years ago
- DrXploit is a powerful and open-source penetration testing and exploitation tool for web applications. This tool is designed to automate …☆11Updated last month
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆13Updated 3 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated 8 months ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 3 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- A tool box with 174 useful and common Linux tools for penetration testing and security audits.☆15Updated last year
- A swiss army knife for pentesting networks☆20Updated 2 years ago
- A tool to check for response status codes with ease☆14Updated 2 years ago
- python keylogger and spying malware .☆13Updated 3 weeks ago
- A simple PHP web backdoor allows you to retrieve directory/file contents and upload file(s) from the local machine or remote URL.☆19Updated 3 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆15Updated 5 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- ☆10Updated 7 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆16Updated 2 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- ☆9Updated 3 years ago
- a personal leaks database to improve combolists and for more effective pentests☆24Updated last year
- Install popular tools used while pentesting & playing labs☆14Updated 3 years ago
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆12Updated 3 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆13Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago