Mahmoud7Osman / BurpsuiteLinks
Activation For Burpsuite Professional By UNCIA
☆24Updated 3 years ago
Alternatives and similar repositories for Burpsuite
Users that are interested in Burpsuite are comparing it to the libraries listed below
Sorting:
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- New Framework Red Team Operations☆19Updated 4 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆107Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆118Updated last year
- ☆23Updated 5 years ago
- ☆24Updated 3 years ago
- Source of swisskyrepo.github.io - Public☆26Updated 5 months ago
- ☆47Updated last year
- Retrieve all mails of users related to a git repository, a git user or a git organization☆57Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- Run search-that-hash from Google colab with fast offline (hashcat) mode☆35Updated 4 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Updated last year
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated last year
- Educational repository with source code examples☆12Updated 6 months ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆79Updated last year
- kb=$(cat sillynotes.txt)☆46Updated 2 weeks ago
- Python3 script to dump breach data from Dehashed☆38Updated 5 months ago
- ☆101Updated 4 years ago
- on-the-fly☆85Updated last year
- Fuxsociety Mr Robot 2.1☆28Updated 2 years ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆74Updated 10 months ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 6 months ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆64Updated 2 years ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆21Updated 3 years ago
- A toolkit for your red team operations☆33Updated 4 years ago
- ☆125Updated last year