Zigrin-Security / CakeFuzzerLinks
Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based on specific frameworks with very limited false positives.
☆105Updated 5 months ago
Alternatives and similar repositories for CakeFuzzer
Users that are interested in CakeFuzzer are comparing it to the libraries listed below
Sorting:
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated 2 years ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated 2 years ago
- Automatic security vulnerability remediation for your code.☆64Updated last week
- My talks...☆25Updated 10 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated 2 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- Manage attack surface data on Elasticsearch☆23Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated last year
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Updated last year
- Burp extension used to snip any header from all the requests.☆23Updated 2 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated last year
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- Cloud Exploit Framework☆113Updated 3 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated 2 years ago
- REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to pr…☆79Updated 3 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Updated last year
- Demo of various ways to exploit post based reflected XSS☆18Updated 2 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Updated last year
- A modular tool to search for known vulnerabilities, exploits and more across various data sources☆74Updated this week
- ☆42Updated 2 months ago
- A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an a…☆57Updated last week
- ☆19Updated 2 years ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆64Updated 2 months ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Unicode Security Toolkit☆40Updated last year
- Some of my rough notes for Docker threat detection☆49Updated 2 years ago
- Security Advisories☆35Updated 2 months ago