Burp Suite Professional (x64) v2021.3 [Fully activated]
by Ozimori - March 08, 2021 at 09:33 AM
#1
Star 
Burp Suite Professional.

Architecture: 64 bit.
Release: v2021.3.
Date: 03 March 2021.
Extensions included: jython-standalone-2.7.2; jruby-complete-9.2.16.0.
[*] Activator and Loader: included.

[This release provides several bug fixes]
Most notably:
  • Copy and cut hotkeys now work in inspector tables, and the copied data is formatted appropriately for the types of items in the table.
  • Burp Suite now correctly deletes update files after they have been used.
  • The title bar now displays the name of the update channel you have has chosen if it is not the Stable channel.
  • We have improved the layout of the Intruder "Grep - Payloads" panel.
  • Unwanted update behaviour no longer happens when you have more than one installation of Burp Suite on macOS.
  • We have fixed an issue where the crawler encounters an error if it finds links with URL fragments during the "discovering hidden content" section of the crawl.
  • We have converted filter pop-up windows to dialog boxes throughout Burp Suite, to improve consistency.

Features
[Manual penetration testing features]

  • Intercept everything your browser sees
    A powerful proxy/history lets you modify all HTTP(S) communications passing through your browser.
  • Manage recon data
    All target data is aggregated and stored in a target site map - with filtering and annotation functions.
  • Expose hidden attack surface
    Find hidden target functionality with an advanced automatic discovery function for "invisible" content.
  • Test for clickjacking attacks
    Generate and confirm clickjacking attacks for potentially vulnerable web pages, with specialist tooling.
  • Work with WebSockets
    WebSockets messages get their own specific history - allowing you to view and modify them.
  • Break HTTPS effectively
    Proxy even secure HTTPS traffic. Installing your unique CA certificate removes associated browser security warnings.
  • Manually test for out-of-band vulnerabilities
    Make use of a dedicated client to incorporate Burp Suite's out-of-band (OAST) capabilities during manual testing.
  • Speed up granular workflows
    Modify and reissue individual HTTP and WebSocket messages, and analyze the response - within a single window.
  • Quickly assess your target
    Determine the size of your target application. Auto-enumeration of static and dynamic URLs, and URL parameters.
  • Assess token strength
    Easily test the quality of randomness in data items intended to be unpredictable (e.g. tokens).

[Advanced/custom automated attacks]

  • Faster brute-forcing and fuzzing
    Deploy custom sequences of HTTP requests containing multiple payload sets. Radically reduce time spent on many tasks.
  • Query automated attack results
    Capture automated results in customized tables, then filter and annotate to find interesting entries/improve subsequent attacks.
  • Construct CSRF exploits
    Easily generate CSRF proof-of-concept attacks. Select any suitable request to generate exploit HTML.
  • Facilitate deeper manual testing
    See reflected/stored inputs even when a bug is not confirmed. Facilitates testing for issues like XSS.
  • Scan as you browse
    The option to passively scan every request you make, or to perform active scans on specific URLs.
  • Automatically modify HTTP messages
    Settings to automatically modify responses. Match and replace rules for both responses and and requests.

[Automated scanning for vulnerabilities]
  • Harness pioneering AST technology
    High signal: low noise. Scan with pioneering, friction-free, out-of-band-application security testing (OAST).
  • Conquer client-side attack surfaces
    Hybrid AST and built-in JavaScript analysis engine help to find holes in client-side attack surfaces.
  • Fuel vulnerability coverage with research
    Cutting-edge scan logic from PortSwigger Research combines with coverage of over 100 generic bugs.
  • Fine-tune scan control
    Get fine-grained control, with a user-driven scanning methodology. Or, run "point-and-click" scans.
  • Remediate bugs effectively
    Custom descriptions and step-by-step remediation advice for every bug, from PortSwigger Research.
  • Configure scan behavior
    Customize what you audit, and how. Skip specific checks, fine-tune insertion points, and much more.
  • Navigate difficult applications
    Crawl more complex targets. Burp Suite's crawler identifies locations based on content - not just URL.
  • Effectively apply IAST
    Source identification and vulnerability reporting simplified, with optional code instrumentation.
  • Experience browser-driven scanning
    Browser-driven scanning is already striding toward better coverage of tricky targets like AJAX-heavy single page apps.

[Extensions]
  • Create custom extensions
    Extender API ensures universal adaptability. Code custom extensions to make Burp work for you.
  • Logger++
    For in-depth vulnerability detail, ordered and arranged in an easily accessible table, make use of Logger++.
  • Autorize
    When testing for authorization vulnerabilities, save time and perform repeat requests with Autorize.
  • Turbo Intruder
    Configured in Python, with a custom HTTP stack, Turbo Intruder can unleash thousands of requests per second.
  • J2EE Scan
    Expand your Java-specific vulnerability catalogue and hunt the most niche bugs, with J2EEScan.
  • Access the extension library
    The BApp Store customizes and extends capabilities. Over 250 extensions, written and tested by Burp users.
  • Upload Scanner
    Adapt Burp Scanner's attacks by uploading and testing multiple file-type payloads, with Upload Scanner.
  • AuthMatrix
    Run AuthMatrix with Autorize to define your access-level vulnerability authorization check.
  • Param Miner
    Quickly find unkeyed inputs with Param Miner - can guess up to 65,000 parameter names per second.
  • Backslash Powered Scanner
    Find research-grade bugs, and bridge human intuition and automation, with Backslash Powered Scanner.

Price: 399$/year.

Activator scan: "https://www.virustotal.com/gui/file/25027c06a228ebd2e03b0b4e1e34e12c446c4a13054659bfbcf4daadc253fe03/detection".
Loader scan: "https://www.virustotal.com/gui/file/9c3752acee569ec200edc2564a72f0f9f1daa7112fd7d81f034e3b3d47c8b1b0/detection".
Burp scan: "https://www.virustotal.com/gui/file/ac46ef6a9851a03ac3449189fe951d01a872de2e3d21ee13a9993ee1ac6732c0/detection".

Download link:
Hidden Content
You must register or login to view this content.

Archive password
Hidden Content
You must register or login to view this content.


[!] Archive successfully verified.
[!] Best encrypted file hosting available.
[!] Max security level.
[!] Fast download speed.

Best regards,
Ledabsolute.
This forum account is currently banned. Ban Length: Permanent (N/A).
Ban Reason: https://raidforums.com/Thread-Scam-Report-against-Ozimori-900
Reply
#2
Thanks For Sharing  Heart

But you have a very simple problem,
Which is that you have changed the name of the files and this is the reason why the program did not run successfully
Please change the file name from (
Activator.jar ) to ( Dr.FarFar.jar ) in the folder to work properly


Delete ( " ) + ( ". ) from URL + Password
Reply
#3
(March 08, 2021 at 10:08 AM)Amank Wrote: Thanks For Sharing  Heart

But you have a very simple problem,
Which is that you have changed the name of the files and this is the reason why the program did not run successfully
Please change the file name from (
Activator.jar ) to ( Dr.FarFar.jar ) in the folder to work properly


Delete ( " ) + ( ". ) from URL + Password

1) Activator filename restored.
2) Download link updated.
3) Removed the strings delimitators, from the locked contents.

Best regards,
Ledabsolute.
This forum account is currently banned. Ban Length: Permanent (N/A).
Ban Reason: https://raidforums.com/Thread-Scam-Report-against-Ozimori-900
Reply
#4
(March 08, 2021 at 10:08 AM)Amank Wrote: Thanks For Sharing  Heart

But you have a very simple problem,
Which is that you have changed the name of the files and this is the reason why the program did not run successfully
Please change the file name from (
Activator.jar ) to ( Dr.FarFar.jar ) in the folder to work properly


Delete ( " ) + ( ". ) from URL + Password

Lol. Might want to give credit to Dr.FarFar to while you're at, OP.
Reply
#5
(March 08, 2021 at 10:45 AM)burpingjimmy Wrote:
(March 08, 2021 at 10:08 AM)Amank Wrote: Thanks For Sharing  Heart

But you have a very simple problem,
Which is that you have changed the name of the files and this is the reason why the program did not run successfully
Please change the file name from (
Activator.jar ) to ( Dr.FarFar.jar ) in the folder to work properly


Delete ( " ) + ( ". ) from URL + Password

Lol. Might want to give credit to Dr.FarFar to while you're at, OP.

It's very simple.
The credits are already auto-inserted, from "Dr.FarFar"; in each of the main files. They are automatically showed at every startup of the Software. There is not the necessity to be verbose. Moreover, I changed the filename related the activator: only for a better users usability.

Best regards,
Ledabsolute.
This forum account is currently banned. Ban Length: Permanent (N/A).
Ban Reason: https://raidforums.com/Thread-Scam-Report-against-Ozimori-900
Reply
#6
superb shaRING.......
Reply
#7
Thank you for sharing !!!!
Reply
#8
Sorry, but isnt this public? https://twitter.com/3XS0/status/1337492961773449219

You can download the exact same for free here:
https://www.dr-farfar.com/burp-suite-professional-full/

Thank you for sharing with the members though.
Reply
#9
(March 08, 2021 at 12:40 PM)banana51 Wrote: Sorry, but isnt this public? https://twitter.com/3XS0/status/1337492961773449219

You can download the exact same for free here:
https://www.dr-farfar.com/burp-suite-professional-full/

Thank you for sharing with the members though.

Mine share does not contains annoying ADS; timer before the Download; invasive Iframe; redirecting to Pop-Up; slow server connection; and logged information about the requester. Unlike that: it's hosted in the best End-To-End encrypted file hosting; which does not save any information regarding users; fully Anonymous; no ADS; no waiting times; and ultra fast Downloading speed. It's your choice: but, remember: several importants advantages; totally free. I'm pretty confident that my job done: should deserve only 8 credits. It's all up to you.

Best regards,
Ledabsolute.
This forum account is currently banned. Ban Length: Permanent (N/A).
Ban Reason: https://raidforums.com/Thread-Scam-Report-against-Ozimori-900
Reply
#10
Such a S3xy post.. i stand in awe..
Thanks for the contribution bby
Reply
#11
(March 08, 2021 at 09:33 AM)Ledabsolute Wrote: Burp Suite Professional.

Architecture: 64 bit.
Release: v2021.3.
Date: 03 March 2021.
Extensions included: jython-standalone-2.7.2; jruby-complete-9.2.16.0.
[*] Activator and Loader: included.

[This release provides several bug fixes]
Most notably:
  • Copy and cut hotkeys now work in inspector tables, and the copied data is formatted appropriately for the types of items in the table.
  • Burp Suite now correctly deletes update files after they have been used.
  • The title bar now displays the name of the update channel you have has chosen if it is not the Stable channel.
  • We have improved the layout of the Intruder "Grep - Payloads" panel.
  • Unwanted update behaviour no longer happens when you have more than one installation of Burp Suite on macOS.
  • We have fixed an issue where the crawler encounters an error if it finds links with URL fragments during the "discovering hidden content" section of the crawl.
  • We have converted filter pop-up windows to dialog boxes throughout Burp Suite, to improve consistency.

Features
[Manual penetration testing features]

  • Intercept everything your browser sees
    A powerful proxy/history lets you modify all HTTP(S) communications passing through your browser.
  • Manage recon data
    All target data is aggregated and stored in a target site map - with filtering and annotation functions.
  • Expose hidden attack surface
    Find hidden target functionality with an advanced automatic discovery function for "invisible" content.
  • Test for clickjacking attacks
    Generate and confirm clickjacking attacks for potentially vulnerable web pages, with specialist tooling.
  • Work with WebSockets
    WebSockets messages get their own specific history - allowing you to view and modify them.
  • Break HTTPS effectively
    Proxy even secure HTTPS traffic. Installing your unique CA certificate removes associated browser security warnings.
  • Manually test for out-of-band vulnerabilities
    Make use of a dedicated client to incorporate Burp Suite's out-of-band (OAST) capabilities during manual testing.
  • Speed up granular workflows
    Modify and reissue individual HTTP and WebSocket messages, and analyze the response - within a single window.
  • Quickly assess your target
    Determine the size of your target application. Auto-enumeration of static and dynamic URLs, and URL parameters.
  • Assess token strength
    Easily test the quality of randomness in data items intended to be unpredictable (e.g. tokens).

[Advanced/custom automated attacks]

  • Faster brute-forcing and fuzzing
    Deploy custom sequences of HTTP requests containing multiple payload sets. Radically reduce time spent on many tasks.
  • Query automated attack results
    Capture automated results in customized tables, then filter and annotate to find interesting entries/improve subsequent attacks.
  • Construct CSRF exploits
    Easily generate CSRF proof-of-concept attacks. Select any suitable request to generate exploit HTML.
  • Facilitate deeper manual testing
    See reflected/stored inputs even when a bug is not confirmed. Facilitates testing for issues like XSS.
  • Scan as you browse
    The option to passively scan every request you make, or to perform active scans on specific URLs.
  • Automatically modify HTTP messages
    Settings to automatically modify responses. Match and replace rules for both responses and and requests.

[Automated scanning for vulnerabilities]
  • Harness pioneering AST technology
    High signal: low noise. Scan with pioneering, friction-free, out-of-band-application security testing (OAST).
  • Conquer client-side attack surfaces
    Hybrid AST and built-in JavaScript analysis engine help to find holes in client-side attack surfaces.
  • Fuel vulnerability coverage with research
    Cutting-edge scan logic from PortSwigger Research combines with coverage of over 100 generic bugs.
  • Fine-tune scan control
    Get fine-grained control, with a user-driven scanning methodology. Or, run "point-and-click" scans.
  • Remediate bugs effectively
    Custom descriptions and step-by-step remediation advice for every bug, from PortSwigger Research.
  • Configure scan behavior
    Customize what you audit, and how. Skip specific checks, fine-tune insertion points, and much more.
  • Navigate difficult applications
    Crawl more complex targets. Burp Suite's crawler identifies locations based on content - not just URL.
  • Effectively apply IAST
    Source identification and vulnerability reporting simplified, with optional code instrumentation.
  • Experience browser-driven scanning
    Browser-driven scanning is already striding toward better coverage of tricky targets like AJAX-heavy single page apps.

[Extensions]
  • Create custom extensions
    Extender API ensures universal adaptability. Code custom extensions to make Burp work for you.
  • Logger++
    For in-depth vulnerability detail, ordered and arranged in an easily accessible table, make use of Logger++.
  • Autorize
    When testing for authorization vulnerabilities, save time and perform repeat requests with Autorize.
  • Turbo Intruder
    Configured in Python, with a custom HTTP stack, Turbo Intruder can unleash thousands of requests per second.
  • J2EE Scan
    Expand your Java-specific vulnerability catalogue and hunt the most niche bugs, with J2EEScan.
  • Access the extension library
    The BApp Store customizes and extends capabilities. Over 250 extensions, written and tested by Burp users.
  • Upload Scanner
    Adapt Burp Scanner's attacks by uploading and testing multiple file-type payloads, with Upload Scanner.
  • AuthMatrix
    Run AuthMatrix with Autorize to define your access-level vulnerability authorization check.
  • Param Miner
    Quickly find unkeyed inputs with Param Miner - can guess up to 65,000 parameter names per second.
  • Backslash Powered Scanner
    Find research-grade bugs, and bridge human intuition and automation, with Backslash Powered Scanner.

Price: 399$/year.

Download link: [Hidden Content]
Folder link: [Hidden Content]

Folder password: [Hidden Content]
Access file password: [Hidden Content]
Archive password: [Hidden Content]

[!] Archive successfully verified.
[!] Best encrypted file hosting available.
[!] Max security level.
[!] Fast download speed.

Best regards,
Ledabsolute.

it's really an incredible sharing. I'm downloading it right now and can't wait to try it out. thank you so much bro
Reply
#12
thanks for sharing, downloading now
Reply

Possibly Related Threads…
Thread Author Replies Views Last Post
Ableton Live Suite Ableton Live Suite 11.0.0 [R2RxCOLOSIB REPACK] colosib 18 2,990 9 hours ago
Last Post: diyahd
SmartPhone Forensic System Professional v6.100.0 [Cracked] uCare 66 8,494 May 13, 2021 at 07:41 AM
Last Post: velkoo
Cobaltstrike 4.3 fully cracked, uncompressed and working 100% ShinyAPT 26 1,819 May 13, 2021 at 06:09 AM
Last Post: hashbang

 Users browsing this thread: 1 Guest(s)