Modular Buffer Overflow Fuzzer and Exploitation Tool
☆10Aug 28, 2019Updated 6 years ago
Alternatives and similar repositories for zBOF
Users that are interested in zBOF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Nov 5, 2020Updated 5 years ago
- Ansible role to deploy Roon Server in a docker container.☆10Sep 13, 2025Updated 6 months ago
- ☆13Nov 26, 2025Updated 3 months ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Barebones RAT which provides a shell over TLS☆12Apr 10, 2021Updated 4 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆66Jun 29, 2019Updated 6 years ago
- Proof-of-concept web app built on top of Frida☆22Apr 11, 2015Updated 10 years ago
- ☆14Oct 9, 2021Updated 4 years ago
- The OWASP Amass Homebrew Formula☆17Jul 13, 2025Updated 8 months ago
- A basic bash script to configure Kali☆16Apr 12, 2022Updated 3 years ago
- A Ruby library for Ronin that provides a Ruby interface to various third-party security scanners.☆27Mar 9, 2020Updated 6 years ago
- Miscellaneous scripts and tools☆15Oct 17, 2019Updated 6 years ago
- Dynamic Callbacks can be used for re-establishing communication with C2 infrastructure and for achieving persistence by using different m…☆15Oct 17, 2018Updated 7 years ago
- ☆13Jul 19, 2017Updated 8 years ago
- Dockerfile that builds a bootable ISO with Linux, Bash, Toybox, Busybox and mounts the virtio 9p export with the "host9p" mount_tag, and …☆20Apr 27, 2022Updated 3 years ago
- ☆12Jan 31, 2022Updated 4 years ago
- To run Burpsuite from launcher, You may run it in terminal by script, But by this tool you will able to run it from Launcher with a Burp …☆11Sep 24, 2023Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆26Jan 24, 2025Updated last year
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- Chrome Extension for XSS Hunter Payloads☆14Sep 7, 2016Updated 9 years ago
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/pynarcissus☆19Dec 9, 2015Updated 10 years ago
- ☆20Jan 10, 2025Updated last year
- ☣️ Simple Master Boot Record (MBR) override example☆15Jul 22, 2017Updated 8 years ago
- Dump WiFi passwords on Windows 10☆23Jan 25, 2018Updated 8 years ago
- Lightwork Memo Series☆17Oct 15, 2025Updated 5 months ago
- Blogseries on DevOps☆13Oct 19, 2023Updated 2 years ago
- A collection of tools for overwriting the MBR (Master Boot Record) of a machine with another file.☆20Apr 15, 2014Updated 11 years ago
- Web Sight Front-end Community Edition☆24May 25, 2020Updated 5 years ago
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆17Oct 30, 2025Updated 4 months ago
- This is the supporting GitHub link for the YouTube tutorial on configuring NGINX/Plus as Load Balancer☆16Jun 25, 2021Updated 4 years ago
- Emerald is an advanced network scanner, which automates many useful functions.☆11May 13, 2019Updated 6 years ago
- The most complete and up-to-date repository for BladeRF and YateBTS compatibility☆29Apr 9, 2023Updated 2 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- A highly customizable statusline for Vim☆11Dec 20, 2016Updated 9 years ago
- Notes on "Penetration Testing: A Hands-On Guide To Hacking"☆54May 11, 2019Updated 6 years ago