VKECE / Burp-LoaderLinks
|| Activate Burp Suite Pro with Loader and Key-Generator ||
☆35Updated 4 years ago
Alternatives and similar repositories for Burp-Loader
Users that are interested in Burp-Loader are comparing it to the libraries listed below
Sorting:
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆68Updated 7 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆40Updated 11 months ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated 8 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆48Updated 9 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆48Updated 11 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 9 months ago
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆19Updated 2 years ago
- PassBreaker☆63Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆60Updated 3 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆91Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆23Updated last year
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆37Updated 2 years ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆109Updated 3 months ago
- Find Email Spoofing Vulnerablity of domains☆98Updated last year
- a curated list of shodan dorks for finding sensitive data in shodan.io☆30Updated last year
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆47Updated 2 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆40Updated 2 years ago
- ☆66Updated 2 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆66Updated last year
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆38Updated 11 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated 2 months ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆25Updated 3 years ago
- Pentest/Red Team: Resources, repos and scripts.☆72Updated 3 weeks ago
- ☆25Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆23Updated 2 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago