A regular expression fuzzer.
☆45Mar 13, 2018Updated 8 years ago
Alternatives and similar repositories for Regaxor
Users that are interested in Regaxor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 8 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 9 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆13Oct 14, 2016Updated 9 years ago
- Auditing & Hardening script for Kubernetes☆45Apr 12, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Aug 26, 2018Updated 7 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- CVE-2017-9506 - SSRF☆190Feb 14, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- ☆18Nov 24, 2020Updated 5 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Sep 9, 2022Updated 3 years ago
- HTML5 WebSocket message fuzzer☆147Nov 23, 2018Updated 7 years ago
- A Webkit RCE exploit and an SBX bug☆34Jun 8, 2019Updated 6 years ago
- ☆162Dec 7, 2017Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- WPS scan and pwn tool☆70Nov 12, 2019Updated 6 years ago
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆12Jul 17, 2017Updated 8 years ago
- ☆13May 17, 2016Updated 9 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆260Aug 22, 2021Updated 4 years ago
- Piper Burp Suite Extender plugin☆130Jan 14, 2026Updated 2 months ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- ☆16Aug 31, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tool is to check for Cache Deception Attack Both For Authenticated and UnAuthenticated Pages☆44Nov 23, 2021Updated 4 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- kbench is a test suite to benchmark several hash table implementations heavily based on Heng Li's udb☆12Jan 8, 2018Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- A Scala DSL (API) designed for monitoring event streams, such as for example log files. Based on data parameterized automata and temporal…☆11Dec 21, 2020Updated 5 years ago
- ☆139Jul 13, 2017Updated 8 years ago