drcrypterdotru / BurnWP-FrameworkLinks
BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester
☆81Updated 3 months ago
Alternatives and similar repositories for BurnWP-Framework
Users that are interested in BurnWP-Framework are comparing it to the libraries listed below
Sorting:
- Laravel RCE Exploitation Toolkit☆48Updated 2 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆129Updated 8 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆42Updated 2 years ago
- ☆109Updated 11 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆145Updated last year
- ☆47Updated last year
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆77Updated last year
- A fast subdomain takeover tool☆85Updated 2 years ago
- This repository contains the best fuzzing wordlist files☆34Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Updated 3 weeks ago
- ☆91Updated 10 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- External recon toolkit☆54Updated last year
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆14Updated 7 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆35Updated 7 months ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆43Updated 11 months ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆59Updated last year
- GeoServer Remote Code Execution☆86Updated 9 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆55Updated 7 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated 2 years ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆85Updated 11 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )☆61Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 6 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Updated last year