drcrypterdotru / BurnWP-FrameworkLinks
BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester
☆83Updated 3 months ago
Alternatives and similar repositories for BurnWP-Framework
Users that are interested in BurnWP-Framework are comparing it to the libraries listed below
Sorting:
- Laravel RCE Exploitation Toolkit☆49Updated 2 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆126Updated 8 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆54Updated 7 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆42Updated 2 years ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆144Updated last year
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆276Updated last month
- This repository contains the best fuzzing wordlist files☆33Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- CVE-2025-49144 PoC for security researchers to test and try.☆85Updated 6 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆34Updated 6 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆84Updated 10 months ago
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- ☆21Updated 9 months ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆42Updated 10 months ago
- ☆47Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆77Updated last year
- GeoServer Remote Code Execution☆86Updated 9 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Updated this week
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 6 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- External recon toolkit☆54Updated last year
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆14Updated 7 months ago
- ☆110Updated 10 months ago
- A fast subdomain takeover tool☆85Updated 2 years ago
- A Simple JS code to keylogger data and send it to the personal server☆31Updated last year