VKECE / Burp-LoaderLinks
|| Activate Burp Suite Pro with Loader and Key-Generator ||
☆47Updated 4 years ago
Alternatives and similar repositories for Burp-Loader
Users that are interested in Burp-Loader are comparing it to the libraries listed below
Sorting:
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆61Updated 7 months ago
- 「🧱」Test a list of payloads and see if you can bypass it☆62Updated 3 years ago
- a curated list of shodan dorks for finding sensitive data in shodan.io☆36Updated last year
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆116Updated 2 weeks ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Updated last year
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Updated last year
- ☆65Updated 2 years ago
- External recon toolkit☆54Updated last year
- Burp Suite Proxy Toggler Lite Add-on for Mozilla Firefox.☆34Updated 2 months ago
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆77Updated last year
- RedTeam - Red Team Tools☆48Updated 3 years ago
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆43Updated 7 years ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Updated last year
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆95Updated 4 months ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆33Updated 3 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆96Updated last year
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆79Updated 2 months ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆26Updated last year
- WooCommerce Payments: Unauthorized Admin Access Exploit☆42Updated 2 years ago
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆60Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆45Updated 8 months ago
- aws cli pentesting/red team snippets☆32Updated 2 years ago
- Kali Packerge Manager☆63Updated 2 years ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆75Updated 3 months ago
- Bypassing File Upload Restriction using Magic Bytes☆22Updated 3 years ago