Simple, hand-picked list of fuzz strings
☆34Nov 5, 2016Updated 9 years ago
Alternatives and similar repositories for FuzzStrings
Users that are interested in FuzzStrings are comparing it to the libraries listed below
Sorting:
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Does some google dorks against a domain☆166Jan 20, 2020Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- ☆19Apr 29, 2015Updated 10 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Jul 1, 2014Updated 11 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Feb 18, 2015Updated 11 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Apr 22, 2018Updated 7 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Mar 2, 2018Updated 8 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Scripts for Deploying new server☆49Apr 26, 2025Updated 10 months ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- ARP ping detector on local network☆15Feb 3, 2013Updated 13 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago
- Scripts that aren't PowerShell☆48Jan 13, 2020Updated 6 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- Penetration testing on windows(7 or 8)☆25Oct 21, 2020Updated 5 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago