ariary / cfuzzLinks
Command line fuzzer and bruteforcer πͺ wfuzz for command
β90Updated 3 years ago
Alternatives and similar repositories for cfuzz
Users that are interested in cfuzz are comparing it to the libraries listed below
Sorting:
- β116Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolvedβ32Updated 3 years ago
- An Evil OIDC Serverβ54Updated 3 years ago
- π‘ Ease file sharing during pentest/CTF πΈβ12Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.comβ39Updated 3 years ago
- an Evil Java RMI Registry.β51Updated 2 years ago
- A VS Code extension to preview XML nmap outputβ44Updated 9 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.β48Updated last year
- Small python script wrapper for automating hashcat commandsβ38Updated 4 years ago
- wordlists for password crackingβ28Updated 3 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)β32Updated 3 years ago
- Fast website scraper and wordlist generatorβ82Updated 7 months ago
- Tools that trigger False Positive AV alertsβ53Updated 11 months ago
- A fast wordlist to nthash converterβ21Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021β27Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.β59Updated 2 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.β84Updated 6 months ago
- PoC for CVE-2021-4034 dubbed pwnkitβ35Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enabβ¦β40Updated 3 years ago
- Mara is a userland pty/tty snifferβ53Updated last year
- Enumerate AWS permissions and resources.β71Updated 3 years ago
- Red team oriented key finder and correlatorβ21Updated 2 weeks ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talksβ64Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30β29Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped imagesβ29Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Toolβ24Updated 4 years ago
- β54Updated 4 years ago
- Collection of my slide decks, conference videos and research white papersβ27Updated 2 months ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, anβ¦β144Updated 2 years ago
- Deployment code for ashirt-serverβ20Updated last month