Mahmoud7Osman / BurpsuiteLinks
Activation For Burpsuite Professional By UNCIA
☆24Updated 3 years ago
Alternatives and similar repositories for Burpsuite
Users that are interested in Burpsuite are comparing it to the libraries listed below
Sorting:
- Python3 script to dump breach data from Dehashed☆38Updated 6 months ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆79Updated last year
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆13Updated 5 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆39Updated last year
- This repo for making it easy to transfer files on the OSCP exam using FTP,PUT,SMB,GET☆19Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Pentesting Tools to Automatize Active Directory Hacking☆22Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆86Updated 4 years ago
- Collection Of LolSec☆37Updated 6 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆112Updated 3 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆208Updated 5 months ago
- Well, I have created this shit for educational pruposes (I think)☆38Updated 3 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Updated 3 years ago
- Full Valid Fake Data Generator☆101Updated last year
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆73Updated 11 months ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- A C ransomware(educational only)☆21Updated 3 years ago
- Cybersecurity blog. Red Team, pentest, malware analysis and dev☆91Updated this week
- Run search-that-hash from Google colab with fast offline (hashcat) mode☆35Updated 4 years ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆124Updated 3 years ago
- Fuxsociety Mr Robot 2.1☆28Updated 2 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆108Updated 2 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆32Updated 6 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆118Updated last year
- Windows Hacking FrameWork using Reverse Shell☆105Updated 9 months ago
- Undetectable payload for Windows 10 and 11☆40Updated 2 years ago