Find exploitable PHP files by parameter fuzzing and function call tracing
☆72Jan 24, 2017Updated 9 years ago
Alternatives and similar repositories for phuzz
Users that are interested in phuzz are comparing it to the libraries listed below
Sorting:
- SMS Phishing Tools☆79Jul 19, 2017Updated 8 years ago
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Dec 9, 2016Updated 9 years ago
- Some wordpress user enumeration scripts.☆38Dec 21, 2016Updated 9 years ago
- Tor relay nearest neighbour ranking☆10Oct 18, 2021Updated 4 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Simple FTP fuzzer to demonstrate boofuzz usage.☆29May 21, 2021Updated 4 years ago
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆11Nov 5, 2020Updated 5 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited☆13Feb 13, 2024Updated 2 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30May 20, 2021Updated 4 years ago
- Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.☆284Sep 28, 2017Updated 8 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- Malicious Software SRC Extract☆76Dec 31, 2016Updated 9 years ago
- Brute forcer and shell deployer for WildFly☆100Mar 10, 2018Updated 7 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- splunk_pentest_app☆50Apr 22, 2016Updated 9 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆110Sep 18, 2018Updated 7 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Jan 22, 2019Updated 7 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Warning: These are REAL, EVIL executables.. download at your own risk, submit your own.☆18Jul 13, 2020Updated 5 years ago
- Quick and dirty .net console app for querying mssql servers.☆24Aug 30, 2018Updated 7 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 9 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- Helper scripts to assist penetration testing and exploit development☆35Dec 11, 2024Updated last year
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago