Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty Hunters! Unlock the power of comprehensive fuzzing with our meticulously curated Fuzzing Directory, a one-stop solution designed to streamline your penetration testing and bug bounty hunting endeavors.
☆25Jan 13, 2024Updated 2 years ago
Alternatives and similar repositories for Fuzzout
Users that are interested in Fuzzout are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Mar 17, 2024Updated 2 years ago
- ☆11Sep 15, 2024Updated last year
- proxy-me is a tool to grab or scrape proxies across internet under specific protocols, It is a lightweight project that hourly scrapes lo…☆11Apr 9, 2023Updated 3 years ago
- CVE-2022-39227 : Proof of Concept☆22Mar 19, 2024Updated 2 years ago
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆86Apr 1, 2026Updated 2 weeks ago
- DefroxPot is a honeypot project designed to detect, monitor, and analyze malicious activity in a controlled environment. This project aim…☆18Jul 8, 2024Updated last year
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆13Jul 22, 2024Updated last year
- An Android app to easily manage Frida server on your device or emulator☆118Jan 3, 2026Updated 3 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆13Apr 21, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 8 months ago
- Offline Android App to illustrate Auto Complete Indian cities and states text views☆22Jan 8, 2019Updated 7 years ago
- NSEC3 Zone Walker☆13Nov 27, 2025Updated 4 months ago
- Code for the solutions of practical reverse engineering☆23Jan 17, 2020Updated 6 years ago
- Collection's of Tech Talk that are presented by me :)☆102Jan 12, 2025Updated last year
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- Monorepo for challenges, infra, and theming for UIUCTF 2024 (https://2024.uiuc.tf/)☆17Jul 14, 2024Updated last year
- DCTF 2022 Challenge and infrastructure repository☆10May 8, 2024Updated last year
- ☆17Apr 30, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- e2e Scanning research module☆25Mar 26, 2026Updated 3 weeks ago
- Kyuubi is a Telegram bot written in Golang. a multipurpose telegram bot to use in recon process. Don't you have access to terminal to do …☆12Oct 11, 2023Updated 2 years ago
- short, precise and uncommented solutions to keygenme or crackme challenges. INFO: Sadly crackmes.de got shut down. I do not have another …☆14Sep 14, 2016Updated 9 years ago
- python specific evil text objects for emacs☆12Feb 8, 2022Updated 4 years ago
- ☆10May 22, 2023Updated 2 years ago
- Situational Awareness script to identify how and where to run implants☆68Dec 6, 2024Updated last year
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆17Nov 20, 2014Updated 11 years ago
- Search files for high entropy strings.☆25Nov 20, 2020Updated 5 years ago
- PowerShell Obfuscator☆11Jul 21, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆133Sep 6, 2024Updated last year
- ☆10Feb 2, 2024Updated 2 years ago
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1s…☆14Sep 22, 2023Updated 2 years ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- Mine URLs from Browser's Heap Snapshot for fun and profit☆65Aug 9, 2023Updated 2 years ago