xiv3r / Burpsuite-ProfessionalLinks
Latest Burpsuite Professional Version 2025.x.x
☆1,047Updated this week
Alternatives and similar repositories for Burpsuite-Professional
Users that are interested in Burpsuite-Professional are comparing it to the libraries listed below
Sorting:
- recon for bug hunters☆787Updated 2 months ago
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,294Updated 4 months ago
- ☆12Updated last year
- Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.☆653Updated last week
- A complete, beginner-friendly bug bounty roadmap that takes you from zero experience to earning your first bounty.☆214Updated 2 weeks ago
- An insane list of all dorks taken from everywhere from various different sources.☆693Updated 9 months ago
- A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting☆1,247Updated 9 months ago
- ☆432Updated last month
- A Modern Framework for Bug Bounty Hunting☆615Updated 6 months ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,687Updated last week
- Here Are Some Popular Hacking PDF☆508Updated last week
- Roadmap for Web Application Penetration Testing | FREE Resources (Not Pirated)☆336Updated 2 years ago
- HackTheBox Certified Penetration Tester Specialist Cheatsheet☆570Updated last year
- A quick bug bounty guide for beginners☆81Updated 3 months ago
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆863Updated last year
- how to look for Leaked Credentials !☆977Updated last year
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆361Updated 11 months ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆3,082Updated last year
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆201Updated 3 months ago
- Penetration Testing For - Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | Network Pentesting, etc...☆969Updated last month
- All Solutions☆155Updated last year
- Here you can find my eJPT notes, these notes will help you prepare for the eJPT certification.☆61Updated last year
- A list of 350+ free TryHackMe rooms💻 to kick off your cybersecurity learning, organized by topics for easy exploration and practical ski…☆62Updated this week
- list of usernames and email addresses for pentests☆136Updated 3 years ago
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆270Updated this week
- A OWASP Based Checklist With 500+ Test Cases☆786Updated 2 years ago
- Complete Roadmap for Penetration Testing☆241Updated 11 months ago
- Study notes for the Certified Ethical Hacker v12.☆132Updated last year
- EthicalHacking, Python, Nmap, Metasploit☆166Updated 4 years ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆513Updated last week