Yet another awesome fuzzers list
☆15Oct 25, 2024Updated last year
Alternatives and similar repositories for Fuzzers
Users that are interested in Fuzzers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- word-list, payloads , Resources☆28Oct 17, 2025Updated 5 months ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Python script for carving Bitlocker VMK keys☆26Feb 4, 2026Updated last month
- ☆22Jan 11, 2025Updated last year
- OmTraffic is a fast and efficient Python Omegle traffic bot that enables you to send a large number of messages to random strangers on Om…☆10May 21, 2023Updated 2 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 4 years ago
- Offensive security framework combining 70+ tools for network reconnaissance, OSINT, WiFi attacks, credential cracking, exploitation & tra…☆24Jan 3, 2026Updated 2 months ago
- Boilerplate configuration for trojan server (trojan-gfw).☆12Oct 13, 2019Updated 6 years ago
- Automated tool for domains & Subdomains Gathering☆14Feb 26, 2026Updated 3 weeks ago
- Experiment in implementation of an instrumentation for American Fuzzy Lop using DynamoRIO☆15Jul 29, 2017Updated 8 years ago
- A reimplementation of the EtherApe style display for OS X. Note that this is not a fork of EtherApe. Written in a kinder, gentler, age …☆21Dec 3, 2018Updated 7 years ago
- Project 2.2 Frequency counter☆12May 30, 2025Updated 9 months ago
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 4 months ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- ☆55Jun 9, 2021Updated 4 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Jan 14, 2025Updated last year
- Ghidra变强术,一个Ghidra脚本库,二进制安全,PWN☆12Jan 21, 2024Updated 2 years ago
- Avatar placeholder service for web developers and designers.☆18Nov 20, 2021Updated 4 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- Burp suite extension which help you to find inconsistency between content-type header and body parsers☆11Sep 14, 2025Updated 6 months ago
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 6 years ago
- An ongoing collection of awesome software, API libraries, checlists, best guidelines and resources and most important security countermea…☆14Nov 15, 2022Updated 3 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- ☆11Mar 19, 2025Updated last year
- AI assisted Shell, aka "Ash". Wraps around your existing shell and brings AI-LLM to the CLI for analyzing EDA files.☆28Updated this week
- ☆23May 1, 2024Updated last year
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 10 months ago
- Generatrum Linguarum, a conlang word generator library☆11Mar 28, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 2 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Jun 7, 2016Updated 9 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Documentation of vmc☆16Mar 4, 2025Updated last year
- Convert your shellcode into an ASCII string☆127Jun 27, 2025Updated 8 months ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆19Feb 29, 2024Updated 2 years ago
- ☆19Sep 17, 2025Updated 6 months ago