Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty Hunters! Unlock the power of comprehensive fuzzing with our meticulously curated Fuzzing Directory, a one-stop solution designed to streamline your penetration testing and bug bounty hunting endeavors.
☆25Jan 13, 2024Updated 2 years ago
Alternatives and similar repositories for Fuzzout
Users that are interested in Fuzzout are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Mar 17, 2024Updated 2 years ago
- ☆11Sep 15, 2024Updated last year
- proxy-me is a tool to grab or scrape proxies across internet under specific protocols, It is a lightweight project that hourly scrapes lo…☆11Apr 9, 2023Updated 2 years ago
- PHP tool to test XSS☆22Nov 5, 2019Updated 6 years ago
- CVE-2022-39227 : Proof of Concept☆22Mar 19, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆86Jan 7, 2026Updated 2 months ago
- DefroxPot is a honeypot project designed to detect, monitor, and analyze malicious activity in a controlled environment. This project aim…☆18Jul 8, 2024Updated last year
- An Android app to easily manage Frida server on your device or emulator☆114Jan 3, 2026Updated 2 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆12Apr 21, 2023Updated 2 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Offline Android App to illustrate Auto Complete Indian cities and states text views☆22Jan 8, 2019Updated 7 years ago
- NSEC3 Zone Walker☆13Nov 27, 2025Updated 4 months ago
- Collection's of Tech Talk that are presented by me :)☆102Jan 12, 2025Updated last year
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- Monorepo for challenges, infra, and theming for UIUCTF 2024 (https://2024.uiuc.tf/)☆17Jul 14, 2024Updated last year
- ☆65Jul 6, 2023Updated 2 years ago
- DCTF 2022 Challenge and infrastructure repository☆10May 8, 2024Updated last year
- Create Basic SSH Honeypot With Python☆29Jul 11, 2016Updated 9 years ago
- ☆17Apr 30, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- e2e Scanning research module☆24Updated this week
- Kyuubi is a Telegram bot written in Golang. a multipurpose telegram bot to use in recon process. Don't you have access to terminal to do …☆12Oct 11, 2023Updated 2 years ago
- short, precise and uncommented solutions to keygenme or crackme challenges. INFO: Sadly crackmes.de got shut down. I do not have another …☆14Sep 14, 2016Updated 9 years ago
- ☆10May 22, 2023Updated 2 years ago
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆17Nov 20, 2014Updated 11 years ago
- Search files for high entropy strings.☆25Nov 20, 2020Updated 5 years ago
- PowerShell Obfuscator☆11Jul 21, 2022Updated 3 years ago
- ☆10Feb 2, 2024Updated 2 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆132Sep 6, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- Mine URLs from Browser's Heap Snapshot for fun and profit☆65Aug 9, 2023Updated 2 years ago
- All the latest Azure updates are centralised in one repository.☆16Mar 22, 2026Updated last week
- File-Upload-XSS is a Python script that exploits the SVG XSS vulnerability in file upload services to gather information about users visi…☆18Jan 15, 2023Updated 3 years ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago