VKECE / Burp-LoaderLinks
|| Activate Burp Suite Pro with Loader and Key-Generator ||
☆42Updated 4 years ago
Alternatives and similar repositories for Burp-Loader
Users that are interested in Burp-Loader are comparing it to the libraries listed below
Sorting:
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆114Updated 7 months ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆41Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆73Updated 10 months ago
- External recon toolkit☆53Updated 11 months ago
- PassBreaker☆65Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆52Updated last year
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- WooCommerce Payments: Unauthorized Admin Access Exploit☆43Updated 2 years ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆83Updated 7 months ago
- simple recon tool to help you for searching vulnerability on web server☆74Updated 2 weeks ago
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆60Updated last year
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆24Updated last year
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆19Updated 2 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆27Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆75Updated this week
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆49Updated last year
- ☆64Updated 2 years ago
- CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆66Updated 6 years ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆22Updated 3 years ago
- ☆19Updated 8 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆67Updated last year
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Updated last year
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆44Updated 7 years ago
- Metabase Pre-auth RCE☆12Updated 2 years ago