abhisek / afl-in-the-cloudView external linksLinks
Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure
☆31Aug 22, 2019Updated 6 years ago
Alternatives and similar repositories for afl-in-the-cloud
Users that are interested in afl-in-the-cloud are comparing it to the libraries listed below
Sorting:
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- A series of dynamic analysis tools for Binary Ninja, built with PyQt and Binjatron☆20Oct 23, 2020Updated 5 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Aug 12, 2020Updated 5 years ago
- Recent Fuzzing Paper☆36Jul 25, 2023Updated 2 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆141Aug 17, 2021Updated 4 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Automation for security☆13Apr 23, 2016Updated 9 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- USB shenanigans☆16Aug 4, 2019Updated 6 years ago
- ☆26Jan 16, 2026Updated last month
- ☆36May 4, 2025Updated 9 months ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- Blockchain, basic implementation in go☆16Oct 3, 2017Updated 8 years ago
- Demo of a webapp with flawed security, for training purposes☆20Apr 10, 2023Updated 2 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- ☆20Oct 19, 2018Updated 7 years ago
- Webkit JavascriptCore Array unshift function had a race condition, it leads to RCE.☆44Dec 5, 2023Updated 2 years ago
- Dockerfile for AFL++ and helpful other tools☆21May 5, 2020Updated 5 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- An intercepting proxy, based on Netty☆19Sep 14, 2017Updated 8 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 10 years ago
- A Static Analysis Tool For Android Apps☆20Dec 19, 2025Updated last month
- DEF CON 26 WorkShop - Fuzzing FTW☆20Aug 9, 2018Updated 7 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago