AMOSSYS / FragscapyLinks
Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multiple successive tests to determine which options can be used to evade firewalls and IDS.
☆74Updated 4 years ago
Alternatives and similar repositories for Fragscapy
Users that are interested in Fragscapy are comparing it to the libraries listed below
Sorting:
- Automate repetitive tasks for fuzzing☆124Updated 4 years ago
- snmp_fuzzer☆23Updated 5 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆99Updated 4 years ago
- Cisco IOS SNMP RCE PoC☆246Updated 7 years ago
- The FTP fuzzer for Sulley and Peach.☆53Updated 11 years ago
- Real world and CTFs exploiting web/binary POCs.☆79Updated 5 years ago
- ☆25Updated last week
- CVE-2019-1652 /CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!☆227Updated 6 years ago
- ☆29Updated 4 years ago
- Symbolic execution inspired PHP application scanner for code-path discovery☆34Updated 6 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Updated 7 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- Network and USB protocol fuzzing toolkit.☆68Updated 7 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Updated 6 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆68Updated 5 years ago
- A fast generative fuzzer for HTTP☆17Updated 6 years ago
- Set of scripts to deal with Cisco ASA firmware [pack/unpack etc.]☆102Updated 3 years ago
- RTSPhuzz - An RTSP Fuzzer written using the Boofuzz framework☆47Updated 2 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆78Updated 7 years ago
- ☆53Updated 6 years ago
- D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621)☆48Updated 5 years ago
- ☆99Updated 7 years ago
- ☆35Updated 6 years ago
- ☆40Updated 7 years ago
- ☆100Updated 3 years ago
- ☆44Updated 4 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 7 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year