VKECE / Burp-LoaderLinks
|| Activate Burp Suite Pro with Loader and Key-Generator ||
☆47Updated 4 years ago
Alternatives and similar repositories for Burp-Loader
Users that are interested in Burp-Loader are comparing it to the libraries listed below
Sorting:
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆115Updated 8 months ago
- External recon toolkit☆54Updated last year
- A multi web security purposes tool☆45Updated 8 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆42Updated 2 years ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆55Updated 7 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆29Updated 2 years ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆81Updated 9 months ago
- ☆65Updated 2 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆77Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆75Updated 11 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated last year
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Updated last year
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆43Updated 7 years ago
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks — including stealer logs, credential dum…☆43Updated 7 months ago
- Find Email Spoofing Vulnerablity of domains☆98Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- ☆22Updated 10 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆61Updated 7 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Updated last year
- POC exploit for CVE-2015-10141☆30Updated 5 months ago
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆33Updated 2 years ago
- PassBreaker☆65Updated last year