0x9090 / MitmFuzz
On the fly TCP and UDP network fuzzer
☆16Updated 5 years ago
Alternatives and similar repositories for MitmFuzz
Users that are interested in MitmFuzz are comparing it to the libraries listed below
Sorting:
- ☆20Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Dependencies for Veil 3☆18Updated 8 years ago
- Juniper backdoor☆13Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 9 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 10 years ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 11 years ago
- An evolving hacking framework written in python☆11Updated 10 years ago
- CMS Exploit Scripts☆12Updated 9 years ago
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆17Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆23Updated 9 years ago
- Security Advisories and Researches☆16Updated 10 years ago
- Format string exploit generation☆10Updated 9 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- For BurpSuite Plugins☆11Updated 9 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆14Updated 2 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- A collection of scripts and tools I have authored to aid in Pentesting, provided under GNUv3, NOTE: I am not liable if you use them for i…☆34Updated 6 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- ☆47Updated 9 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Updated 2 years ago