Find exploitable PHP files by parameter fuzzing and function call tracing
☆72Jan 24, 2017Updated 9 years ago
Alternatives and similar repositories for phuzz
Users that are interested in phuzz are comparing it to the libraries listed below
Sorting:
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- SMS Phishing Tools☆79Jul 19, 2017Updated 8 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Dec 9, 2016Updated 9 years ago
- Some wordpress user enumeration scripts.☆38Dec 21, 2016Updated 9 years ago
- DirBuster for Node.js☆20Mar 21, 2019Updated 7 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Tor relay nearest neighbour ranking☆10Oct 18, 2021Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.☆284Sep 28, 2017Updated 8 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited☆13Feb 13, 2024Updated 2 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Nov 21, 2017Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Simple FTP fuzzer to demonstrate boofuzz usage.☆29May 21, 2021Updated 4 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆110Sep 18, 2018Updated 7 years ago
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 11 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- splunk_pentest_app☆50Apr 22, 2016Updated 9 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆12Nov 5, 2020Updated 5 years ago
- ☆19May 31, 2017Updated 8 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Malicious Software SRC Extract☆76Dec 31, 2016Updated 9 years ago
- A python module that monkey patches pexpect mainly for binary transfers.☆18Feb 28, 2019Updated 7 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- ☆12Nov 9, 2017Updated 8 years ago
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆11Dec 10, 2024Updated last year
- Raspberry Pi 2 C2☆15Feb 24, 2015Updated 11 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30May 20, 2021Updated 4 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago