FuzzySecurity / afl-frida-buildLinks
Ansible build for Afl++ Frida-Mode
☆24Updated last year
Alternatives and similar repositories for afl-frida-build
Users that are interested in afl-frida-build are comparing it to the libraries listed below
Sorting:
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- ☆59Updated last year
- ☆16Updated 8 months ago
- Lena's scripts/code/resources for malware analysis☆27Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆76Updated last month
- Use WordPress pingback.ping to transfer files.☆17Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆38Updated 3 weeks ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 10 months ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- Python code to Serialize and Unserialize java binary serialization format.☆21Updated this week
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- vulnlab.com reaper writeup☆26Updated last year
- Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.☆50Updated 3 months ago
- ysoserial.net docker image☆28Updated 9 months ago
- Exploits written while preparing for the OSED exam☆22Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆31Updated 3 months ago
- ☆36Updated 7 months ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit☆35Updated 5 months ago
- ☆23Updated 5 months ago
- Presentaciones de congresos☆53Updated last year
- Java archive implant toolkit.☆61Updated 2 months ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Yet Another Memory Analyzer for malware detection☆24Updated last year
- ☆34Updated 10 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 4 months ago
- ☆39Updated 2 weeks ago