VKECE / Burp-LoaderLinks
|| Activate Burp Suite Pro with Loader and Key-Generator ||
☆43Updated 4 years ago
Alternatives and similar repositories for Burp-Loader
Users that are interested in Burp-Loader are comparing it to the libraries listed below
Sorting:
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Updated last year
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Updated last year
- PassBreaker☆66Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆116Updated 7 months ago
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆61Updated 6 months ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆81Updated 8 months ago
- ☆65Updated 2 years ago
- External recon toolkit☆53Updated 11 months ago
- Scripts to set up your own Android 📱 app hacking lab☆94Updated last year
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆73Updated 2 years ago
- a curated list of shodan dorks for finding sensitive data in shodan.io☆34Updated last year
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆60Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆48Updated last year
- ☆20Updated 9 months ago
- Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins☆84Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Updated last year
- ☆13Updated 3 years ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆22Updated 3 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated 2 years ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆54Updated 6 months ago
- Nessus Professional Latest☆43Updated last year
- Find Email Spoofing Vulnerablity of domains☆98Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆44Updated 7 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Updated 2 years ago