apconole / Simple-FuzzerLinks
Simple Fuzzer is a simple config-file driven block/mutation based fuzzing system
☆66Updated 2 years ago
Alternatives and similar repositories for Simple-Fuzzer
Users that are interested in Simple-Fuzzer are comparing it to the libraries listed below
Sorting:
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆76Updated 9 years ago
- ☆101Updated 4 years ago
- GDB commands to aid exploit development☆46Updated 9 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆45Updated 8 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- Simple vulnerability scanning framework☆51Updated 9 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- A Python tool to generate ROP chains☆64Updated 10 months ago
- Material from our CANAPE workshop☆32Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Updated 9 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Updated 4 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆98Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Proof of Concept's provided by Source Incite☆37Updated 8 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Updated 11 years ago
- A collection of PeachPits for Peach Fuzzer to support EAP, 802.1x, and RADIUS Fuzzing☆17Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- hax 'n shit☆121Updated 10 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 8 years ago