Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      All Activity

      This stream auto-updates     

      1. Today
      2. What is Spray365? Spray365 is a password spraying tool that identifies valid credentials for Microsoft accounts (Office 365 / Azure AD). How is Spray365 different from the many other password spraying tools that are already available? Spray365 enables passwords to be sprayed from an “execution plan”. While having a pre-generated execution plan that describes the spraying operation well before it occurs has many other benefits that Spray365 leverages, this also allows password sprays to be resumed (-R option) after a network error or other interruption. While it is easiest to generate a Spray365 execution plan using Spray365 directly, other tools that produce a compatible JSON structure make it easy to build unique password spraying workflows. [hide][Hidden Content]]
      3. Command-line and GUI tools for producing Java source code from Android Dex and Apk files Changelog v1.4 Features [gui] Disk code cache and search rewrite (PR #1483) Allow to load custom input (#1457) Allow to include/exclude dependencies when saving with class filter (#1466)(PR #1467) Bug Fixes [cli] Don’t ignore critical errors (#1150) [gui] Resolve NPE on project save (#1463)(PR #1464) [gui] Confirm directory loading on file open (#1462) [gui] Fix IndexOutOfBoundsException when switching between tabs via mouse wheel (#1456)(PR #1469) [gui] Editor theme loading and error/fallback handling improved (#1476)(PR #1478) [gui] Ask for project file path on exit (#1474) [gui] Escape class, method and field names in Frida code snippet (PR #1480) [gui] Add missing Use debug info option [gui] Use alias for types in tooltips (#1487) Better code styling for if-else blocks (#1455) Workaround to prevent incorrect order after move inline (#1472) Use alias for variable names (#1487) Breaking changes in Jadx API ICodeInfo: lines and code annotations moved to new interface ICodeMetadata with helpful search methods Changes for all code annotations methods to use ICodeAnnotation instead plain Object. [hide][Hidden Content]]
      4. HookCase is a tool for debugging and reverse engineering applications on macOS (aka OS X), and the operating system itself. It re-implements and extends Apple’s DYLD_INSERT_LIBRARIES functionality. It can be used to hook any method in any module (even non-exported ones, and even those that don’t have an entry in their own module’s symbol table). In a single operation, it can be applied to a parent process and all its child processes, whether or not the child processes inherit their parent’s environment. So HookCase is considerably more powerful than DYLD_INSERT_LIBRARIES. It also doesn’t have the restrictions Apple has placed on DYLD_INSERT_LIBRARIES. So, for example, HookCase can be used with applications that have entitlements. HookCase supports interpose hooks. But it also supports another, more powerful kind of hook that we call “patch hooks”. These can hook calls to a method named in its module’s symbol table, including ones that come from the same module. They can also hook calls to an unnamed method (one that isn’t in its module’s symbol table), by specifying the method’s address in its module. So they can be used with non-exported (aka private) methods (named and unnamed) — ones not intended for use by external modules. Patch hooks are so-called because we set them up by “patching” the beginning of an original method with a software interrupt instruction (int 0x30). HookCase’s kernel extension handles the interrupt to implement the hook. This is analogous to what a debugger does when it sets a breakpoint (though it uses int 3 instead of int 0x30). Software interrupts are mostly not used on BSD-style operating systems like macOS and OS X, so we have plenty to choose among. For now, we’re using those in the range 0x30-0x34. Whatever their disadvantages, interpose hooks are very performant. They’re implemented by changing a pointer, so they impose no performance penalty whatsoever (aside from the cost of whatever additional code runs inside the hook). Patch hooks can be substantially less performant — if we have to unset the breakpoint on every call to the hook, then reset it afterward (and protect these operations from race conditions). But this isn’t needed for methods that start with a standard C/C++ prologue in machine code (which is most of them). So most patch hooks run with only a very small performance penalty (that of a single software interrupt). HookCase is compatible with DYLD_INSERT_LIBRARIES and doesn’t stomp on any of the changes it may have been used to make. So a DYLD_INSERT_LIBRARIES hook will always override the “same” HookCase interpose hook. This is because Apple often uses DYLD_INSERT_LIBRARIES internally, in ways it doesn’t document. HookCase would likely break Apple functionality if it could override Apple’s hooks. But this doesn’t apply to patch hooks. Since Apple doesn’t use them, we don’t need to worry about overriding any that Apple may have set. If an interpose hook doesn’t seem to work, try a patch hook instead. (Unless you write them to do so, neither interpose hooks nor patch hooks inherently change the behavior of the methods they hook.) HookCase is compatible with lldb and gdb: Any process with HookCase’s interpose or patch hooks can run inside these debuggers. But you may encounter trouble if you set a breakpoint and a patch hook on the same method, or try to step through code that contains a patch hook. HookCase runs on OS X 10.9 (Mavericks) through macOS 10.15 (Catalina). Changelog v6.0.3 macOS 12.4 once again broke HookCase, by making changes that normally only happen in major releases. This time none of the breakage was caused by changes to internal kernel structures (though some of those used by HookCase did change). Instead it was caused by two changes in behavior. HookCase 6.0.3 works around them. For more information see Issue #34. [hide][Hidden Content]]
      5. Yesterday
      6. Does anyone have a link to a resource that explains how to escalate null pointer dereference to an RCE or some other attack that is not just DOS?
      7. itsMe

        x16 IPTV swissiptv.us

        [Hidden Content]
      8. itsMe

        x11 IPTV iboxs.club

        [Hidden Content]
      9. itsMe

        x5 IPTV snowdark.xyz

        [Hidden Content]
      10. itsMe

        x5 IPTV spectretv.com

        [Hidden Content]
      11. Anti-Malware Our highly acclaimed multi-engine anti-malware software helps keep your computer secure. Advanced Malware Detection and Removal Browser Hijacker Removal Effective Rootkit and Bootkit Detection and Removal Real Time Protection Anti Ransomware Protection Modules How It Works SCAN First, you simply start a scan in order to find suspicious files in your PC ANALYZE When our software finds a suspicious file, it passes the fingerprint to our Cloud Scanning Platform where many different anti-virus engines perform checks CONFIRM Watchdog Anti-Malware rapidly sets about removing any confirmed malicious software [Hidden Content] [hide][Hidden Content]]
      12. itsMe

        Facebook Friend List Scraper

        OSINT tool to scrape names and usernames from large friend lists on Facebook, without being rate limited. NOTE: Facebook changes the markup of it's pages regularly, so the script might break from time to time. Please open an issue if something doesn't work and I'll take a look at it. Pull requests are welcome as well. TODO: Make script check for followers if friend list isn't public. Add more error handling. Add proxy rotation. [hide][Hidden Content]]
      13. itsMe

        Zphisher-GUI-Back_office

        DISCLAIMER This toolkit contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in your province/country before accessing, using,or in any other way utilizing this in a wrong way. This Tool is made for educational purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then Get the hell out of here! It only demonstrates "how phishing works". You shall not misuse the information to gain unauthorized access to someones social media. However you may try out this at your own risk. Zphisher-GUI-Back_office This is a plugin where you can see in real time the victims of your phishing campaign, you just have to change the Zphisher files for these. Easy! This tool creates a graphical back office for the zphish tool (although it is not 100% necessary to use this tool, you can use these files by hosting it on a localhost). [hide][Hidden Content]]
      14. itsMe

        Indosec Shell

        [hide][Hidden Content]]
      15. itsMe

        Zeerx7 Shell

        [hide][Hidden Content]]
      16. Stealer written on C#, logs will be sent to your Discord channel using a webhook. Disclaimer This program is for educational purposes only. How you use this program is your responsibility. I will not be held accountable for any illegal activities. Data extraction: AntiAnalysis (VirtualBox, SandBox, Debugger, VirusTotal, Any.Run) Get system info (Version, CPU, GPU, RAM, IPs, BSSID, Location, Screen metrics, Installed apps) Chromium based browsers (passwords, credit cards, cookies, history, autofill, bookmarks) Firefox based browsers (db files, cookies, history, bookmarks) Internet explorer/Edge (passwords) Saved wifi networks & scan networks around device (SSID, BSSID) File grabber (Documents, Images, Source codes, Databases, USB) Detect banking & cryptocurrency services in browsers Steam, Uplay, Battle.Net, Minecraft session Install keylogger & clipper Desktop & Webcam screenshot ProtonVPN, OpenVPN, NordVPN Crypto Wallets Zcash, Armory, Bytecoin, Jaxx, Exodus, Ethereum, Electrum, AtomicWallet, Guarda, Coinomi, Litecoin, Dash, Bitcoin Crypto Wallet Extensions from Chrome & Edge Binance, coin98, Phantom, Mobox, XinPay, Math10, Metamask, BitApp, Guildwallet, iconx, Sollet, Slope Wallet, Starcoin, Swash, Finnie, KEPLR, Crocobit, OXYGEN, Nifty, Liquality, Auvitas wallet, Math wallet, MTV wallet, Rabet wallet, Ronin wallet, Yoroi wallet, ZilPay wallet, Exodus, Terra Station, Jaxx. Messenger Sessions, Accounts, Tokens Discord, Telegram, ICQ, Skype, Pidgin, Outlook, Tox, Element, Signal Directories structure Filezilla hosts Process list Product key Autorun module Features: These functions will become available in the builder only if you have autorun enabled. Keylogger: The keylogger will turn on if the user is texting in the chat or using the bank's website. Clipper: Clipper turns on and replaces crypto wallet addresses in the clipboard when a user makes a transaction. Webcam screenshots: Webcam screenshots will be taken if the user is watching something obscene on the Internet. Build_2022.05.12_13-13 Latest a verry little change This change will fix for the upcomming change to use with Antivirus Evasion Tool [hide][Hidden Content]] Server Scan [Hidden Content]
      17. dnSpy is a tool to reverse engineer .NET assemblies. It includes a decompiler, a debugger and an assembly editor (and more) and can be easily extended by writing your own extension. It uses dnlib to read and write assemblies so it can handle obfuscated assemblies (eg. malware) without crashing. Features Open Source (GPLv3) and Free Forever (:TM:) Assembly Editor Use C# or Visual Basic to edit any method, property and event Code editor has IntelliSense (code completion, signature help, quick info) Whole classes can be added to assemblies by adding C# and Visual Basic code Edit all metadata of types (classes), methods, properties, events, fields Add, remove, rename any type (class), method, property, event, field Edit, add, remove .NET resources and save them to disk The IL editor allows editing method bodies at the IL level: IL instructions, locals, exception handlers Debugger Debug any .NET assembly, no source code required Set breakpoints in any assembly, including framework assemblies, assemblies in the GAC and assemblies existing only in memory Memory window Output window Attach to process Locals window raw contents of locals (eg. decrypted byte arrays) can be saved to disk Call Stack window Threads window Modules window Modules (eg. decrypted in-memory modules) can be saved to disk Exception Settings Can debug dynamic assemblies Debugging CoreCLR assemblies is supported Decompile to C#, Visual Basic, IL Themes: blue, dark, light (and high contrast) Supports smaller screens (eg. laptops) Line height can be optimized for smaller screens Blank and non-alphanumeric lines are 75% the normal height No extra spacing between lines (saves 1 vertical pixel per line) Menu and toolbar share the same line Full screen mode (Shift+Alt+Enter) saves some vertical pixels High DPI support and per-monitor DPI-aware Translated to several languages Highly extensible Write your own extensions and add your own features All major features are already extensions (assembly editor, debugger, decompiler) Multiple tabs and tab groups Your screen is too big? Don’t cut it in half, add another vertical tab group and read two classes at once! The tabs and positions within the text editors are saved when you close dnSpy and restored at startup so you can continue where you left off Search assemblies Search for types (classes), methods, properties, events, fields Search for strings or numbers in code Assembly analyzer Find usages of types (classes), methods, properties, events, fields BAML to XAML decompiler Fast Highlighted references, keywords References under the caret are highlighted to make it easier to see all uses of the reference in the code Tab, Shift+Tab, Ctrl+Shift+Up, Ctrl+Shift+Down moves to the next or previous reference Alt+Down and Alt+Up moves to the next or previous definition (type (class), method, property, event, field) Structure visualizer Vertical guide lines shown between start and end of code blocks Different colors are used for different blocks, eg. loop, conditional, method, etc dnlib is used to read and write assemblies so it can handle obfuscated code (eg. malware) without crashing Go to commands: Entry point Assembly static initialization method (<Module>..cctor) Any metadata token Any metadata row Syntax highlighted tooltips with XML doc comments when hovering over a type (class), method, property, event, field Methods, properties and events are decompiled in source code order or a custom user-defined order Source code order means that related methods are usually next to each other, just like the programmer wanted Background images can be shown in the text editor Export to project decompiles all selected assemblies and creates a Visual Studio solution Multiple assemblies can be exported at the same time Creates a Visual Studio solution (supports VS2005 – VS-latest) and project files Supports WinForms and WPF classes (creates a code-behind .cs/.vb file and a WinForms .resx / WPF .xaml file) Converts .NET resources to .resx files Open from GAC Command line decompiler Supports Windows, Linux and Mac Syntax highlights output to the screen Scripting with C# REPL Call public dnSpy methods from scripts Script the debugger and other extensions Hex editor Method tokens and addresses are shown in comments and can be clicked to go to the raw metadata or IL bytes Metadata editor Collapse Assembly Explorer nodes command to quickly collapse unused nodes And more… Changelog v6.2 RC1 New features: dnSpy now runs under .NET 6 and .NET Framework 4.8. Move to VS2022 icons for UI and exe files (by @InKahootz and @SychicBoy) Support for tilt/horizontal scrolling in the UI. Added support for editing custom attributes on module resources. Added support for modifying the Log2Rid value when saving the module. Add support for ARM64 target architecture in the assembly editor. Add an enum for PE Magic field in the PE editor (by @riQQ) Show debugged process’s name in the title bar (by @InKahootz) Add support for writing VS2022 compatible .sln files. Added back the Save Code, Save BAML, and Save XAML options in the File context menu which save the contents of the currently open document tab. Debugger: Display a warning message before starting to debug a target file with a different bitness than the current dnSpy version running. Add a new option that allows to automatically break on <Module>::.cctor when starting to debug. Display the exception’s HResult property when an unhandled exception is hit. ILSpy decompiler: Added jump to reference support for jmp() expressions created when the jmp CIL opcode is present. CIL disassembler now includes information about generic parameter attributes and constraints. Add more information to the output when disassembling the module node when using the CIL disassembler. The decompiler now splits up long method call chains using a new line. Generate debug info for yield break; statements. Improvements and bug fixes: Fix the .NET 6 console executable having the incorrect subsystem set in the PE options resulting in a crash. Fixed escaping of namespaces in tooltips. Fixed syntax highlighting for structs in tooltips. Improved RVA <-> FileOffset conversions in PE editor to fix a crash with invalid values being passed in. Improved assembly resolution for .NET Standard, .NET Core, .NET 5, .NET 6. Read probe paths from .config files when searching for satellite assemblies during project export. Fixed incorrect label in the Save Module dialog. ILSpy Decompiler Optimized the variable naming step in the decompiler by reducing memory allocations. Improved insertion of checked() blocks. Improved decompilation of query expressions. Prevent delegate construction decompilation from crashing the entire decompiler if it failed. Improved analysis for unsafe modifier. Ignore invalid prefixes when constructing the ILAst. This prevents a common method used to crash the decompiler from working. Many improvements and fixes to the async method decompilation logic. Optimized the removal of dead nop instructions when building the ILAst. This deficiency was a known method to crash dnSpy’s decompiler by filling a method body with huge amounts of useless code. Fixed a rare case where field initializers would not be detected properly. Fixed a rarely occurring bug that resulted in incorrect ILAst being built. Optimized construction of ILAst by calculating the stack behavior of instruction only once and by caching the result of MethodDef.HasReturnType. Improved required parenthesis analysis. Debugger: Fixed a bug that caused the infamous ??? exception to occur when debugging. Improved debugging support for newer mono runtimes. Fixed a crash that occurred in the .NET Framework version of dnSpy when a module loaded into memory during debugging would contain an invalid file path resulting in a crash. BAML decompiler Resolve namespaces of properties. Fix Name attribute for properties incorrect in rare circumstances. Fix missing x:Static and x:Type (by @wwh1004) Dependency updates: Updated dnlib to 3.5.0 Updated Iced to 1.17.0 Roslyn compiler to 4.1.0 Ookii.Dialogs.Wpf to 5.0.1 VS MEF to 16.9.20 ILSpy to 2.4 Mono.Debugger.Soft was updated to the latest commit. [hide][Hidden Content]]
      18. Last week
      19. james bond

        x2 Pure iptv

        [Hidden Content]
      20. itsMe

        DP Animation Maker 3.5.07

        Smart 2D animation software that lets you turn still images into live moving scenes Create living, breathing worlds from your still image with minimum effort. DP Animation Maker lets you make natural scenes burst with vibrancy and give motion to people and objects. [Hidden Content] [hide][Hidden Content]]
      21. itsMe

        Ghidra 10.1.4

        Ghidra Software Reverse Engineering Framework Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes. Users may also develop their own Ghidra extension components and/or scripts using Java or Python. In support of NSA's Cybersecurity mission, Ghidra was built to solve scaling and teaming problems on complex SRE efforts, and to provide a customizable and extensible SRE research platform. NSA has applied Ghidra SRE capabilities to a variety of problems that involve analyzing malicious code and generating deep insights for SRE analysts who seek a better understanding of potential vulnerabilities in networks and systems. If you are a U.S. citizen interested in projects like this, to develop Ghidra and other cybersecurity tools for NSA to help protect our nation and its allies, consider applying for a career with us. Ghidra 10.1.4 Change History (May 2022) Improvements Debugger:Listing. Refresh button in Debugger's Dynamic Listing and Memory Bytes views now operates without a selection and is more thorough with respect to cache invalidation. (GP-1930) Bugs Analysis. Fixed an exception that occurred when loading programs created in previous versions where the analysis option's type had changed (String to Long). (GP-1738) Analysis. Constant reference propagation now uses pcode injection for segment and all userops. This affects 16-bit code and the HCS12 processor. (GP-1987, Issue #4252) C Parsing. Added C-Parser support for static_assert and _Static_assert keywords. (GP-1958, Issue #4038) C Parsing. Corrected C-Parser to parse sizeof structure members, both sizeof(ptr->member) and sizeof(struct.member). (GP-1964, Issue #4173) Decompiler. Fixed bug causing the Decompiler to not label pointer references to the first parameter on the stack. (GP-2018) GUI. Fixed bug that caused some edited functions to appear twice in the Functions window. (GP-2025) GUI. Fixed potentially slow computer name lookup in the Error Dialog. (GP-2034) Importer:COFF. Fixed importing of non-Microsoft COFF files when any section crosses address 0x80. COFF sections marked as data that won't fit into the default data address space will be loaded in the code address space. (GP-2045) [hide][Hidden Content]]
      22. 0x1

        Xepor - web routing framework

        Xepor (pronounced /ˈzɛfə/, zephyr), a web routing framework for reverse engineers and security researchers. It provides a Flask-like API for hackers to intercept and modify HTTP request and/or HTTP response in a human-friendly coding style. This project is meant to be used with mitmproxy. User write scripts with xepor, and run the script inside mitmproxy with mitmproxy -s your-script.py. If you want to step from PoC to production, from demo(e.g. http-reply-from-proxy.py, http-trailers.py, http-stream-modify.py) to something you could take out with your WiFi Pineapple, then Xepor is for you! Features Code everything with @api.route(), just like Flask! Write everything in one script and no if..else any more. Handle multiple URL routes, even multiple hosts in one InterceptedAPI instance. For each route, you can choose to modify the request before connecting to server (or even return a fake response without connection to upstream), or modify the response before forwarding to user. Blacklist mode or whitelist mode. Only allow URL endpoints defined in scripts to connect to upstream, blocking everything else (in specific domain) with HTTP 404. Suitable for transparent proxying. Human readable URL path definition and matching powered by parse Host remapping. define rules to redirect to genuine upstream from your fake hosts. Regex matching is supported. Best for SSL stripping and server side license cracking! Plus all the bests from mitmproxy! ALL operation modes ( mitmproxy / mitmweb + regular / transparent / socks5 / reverse:SPEC / upstream:SPEC) are fully supported. Use Case Evil AP and phishing through MITM. Sniffing traffic from specific device by iptables + transparent proxy, modify the payload with xepor on the fly. Cracking cloud based software license. See examples/krisp/ as an example. Write complicated web crawler in ~100 lines of codes. See examples/polyv_scrapper/ as an example. ... and many more. SSL stripping is NOT provided by this project. Installation pip install xepor Quick start Take the script from examples/httpbin as an example. mitmweb --web-host=\* --set connection_strategy=lazy -s example/httpbin/httpbin.py In this example, we setup the mitmproxy server on 127.0.0.1. You could change it to any IP on your machine or alternatively to the IP of your VPS. The mitmproxy server running in reverse, upstream and transparent mode requires --set connection_strategy=lazy option to be set so that Xepor could function correctly. I recommand this option always be on for best stability. Set your Browser HTTP Proxy to [Hidden Content], and access web interface at [Hidden Content]. Send a GET request from [Hidden Content] , Then you could see the modification made by Xepor in mitmweb interface, browser devtools or Wireshark. The httpbin.py do two things. When user access [Hidden Content], inject a query string parameter payload=evil_param inside HTTP request. When user access [Hidden Content] (we just pretends we don't know the password), sniff Authorization headers from HTTP requests and print the password to the attacker. Just what mitmproxy always do, but with code written in xepor way. # [Hidden Content] from mitmproxy.http import HTTPFlow from xepor import InterceptedAPI, RouteType HOST_HTTPBIN = "httpbin.org" api = InterceptedAPI(HOST_HTTPBIN) @api.route("/get") def change_your_request(flow: HTTPFlow): """ Modify URL query param. Test at: [Hidden Content] """ flow.request.query["payload"] = "evil_param" @api.route("/basic-auth/{usr}/{pwd}", rtype=RouteType.RESPONSE) def capture_auth(flow: HTTPFlow, usr=None, pwd=None): """ Sniffing password. Test at: [Hidden Content]_ """ print( f"auth @ {usr} + {pwd}:", f"Captured {'successful' if flow.response.status_code < 300 else 'unsuccessful'} login:", flow.request.headers.get("Authorization", ""), ) addons = [api] Download [hide][Hidden Content]]
      23. itsMe

        Mica for Everyone v1.0.6.2

        Mica For Everyone is a tool to customize system backdrop on win32 apps using DwmSetWindowAttribute and other methods. It can apply Mica (or any other backdrop material) on non-client area (window frame) or background of supported apps and its behavior is customizable through a GUI and a config file. [hide][Hidden Content]]
      24. itsMe

        x20 IPTV bingo4k.me

        [Hidden Content]
      25. 1337day-Exploits

        ExploitsLinux USB Use-After-Free

        Linux usbnet code tells minidrivers to unbind while netdev is still up, causing use-after-free conditions. View the full article
      26. Burp Suite Pro – is a reliable and practical platform that provides you with a simple means of performing security testing of web applications. It gives you full control, letting you combine advanced manual techniques with various tools that seamlessly work together to support the entire testing process. The utility is easy-to-use and intuitive and does not require you to perform advanced actions in order to analyze, scan and exploit web apps. It is highly configurable and comes with useful features to assist experienced testers with their work. Features • Burp Proxy • Burp Spider • Burp Repeater • Burp Sequencer • Burp Decoder • Burp Comparer • Burp Intruder • Burp Scanner • Save and Restore • Search • Target Analyzer • Content Discovery • Task Scheduler • Release Schedule [Hidden Content] [Hidden Content]
      1. Load more activity