Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty Hunters! Unlock the power of comprehensive fuzzing with our meticulously curated Fuzzing Directory, a one-stop solution designed to streamline your penetration testing and bug bounty hunting endeavors.
☆25Jan 13, 2024Updated 2 years ago
Alternatives and similar repositories for Fuzzout
Users that are interested in Fuzzout are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Mar 17, 2024Updated 2 years ago
- ☆11Sep 15, 2024Updated last year
- CVE-2022-39227 : Proof of Concept☆22Mar 19, 2024Updated 2 years ago
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22527 leads to RCE☆10Jan 23, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Google Dorking Payloads☆13Jun 24, 2024Updated last year
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆87Apr 1, 2026Updated last month
- DefroxPot is a honeypot project designed to detect, monitor, and analyze malicious activity in a controlled environment. This project aim…☆18Jul 8, 2024Updated last year
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆13Jul 22, 2024Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- An Android app to easily manage Frida server on your device or emulator☆120Jan 3, 2026Updated 4 months ago
- ☆14Mar 26, 2024Updated 2 years ago
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆13Apr 21, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 9 months ago
- Offline Android App to illustrate Auto Complete Indian cities and states text views☆22Jan 8, 2019Updated 7 years ago
- Code for the solutions of practical reverse engineering☆23Jan 17, 2020Updated 6 years ago
- Collection's of Tech Talk that are presented by me :)☆102Jan 12, 2025Updated last year
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- Monorepo for challenges, infra, and theming for UIUCTF 2024 (https://2024.uiuc.tf/)☆17Jul 14, 2024Updated last year
- ☆66Jul 6, 2023Updated 2 years ago
- DCTF 2022 Challenge and infrastructure repository☆10May 8, 2024Updated 2 years ago
- Create Basic SSH Honeypot With Python☆29Jul 11, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆17Apr 30, 2024Updated 2 years ago
- Collection of JSON Files having List of Indian Cities and State☆17Jan 2, 2023Updated 3 years ago
- Linkfinder by Rdzsp is a browser extension that automatically scans and collects endpoints from JavaScript files on websites☆33Aug 22, 2024Updated last year
- e2e Scanning research module☆25Mar 26, 2026Updated last month
- short, precise and uncommented solutions to keygenme or crackme challenges. INFO: Sadly crackmes.de got shut down. I do not have another …☆13Sep 14, 2016Updated 9 years ago
- python specific evil text objects for emacs☆12Feb 8, 2022Updated 4 years ago
- ☆10May 22, 2023Updated 2 years ago
- Situational Awareness script to identify how and where to run implants☆68Dec 6, 2024Updated last year
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆17Nov 20, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆133Sep 6, 2024Updated last year
- ☆10Feb 2, 2024Updated 2 years ago
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1s…☆14Sep 22, 2023Updated 2 years ago
- Manage attack surface data on Elasticsearch☆26Nov 20, 2023Updated 2 years ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- Mine URLs from Browser's Heap Snapshot for fun and profit☆65Aug 9, 2023Updated 2 years ago