Fuzzer for Amplification Vulnerabilities (USENIX '22, Krupp et al)
☆16Aug 27, 2022Updated 3 years ago
Alternatives and similar repositories for ampfuzz
Users that are interested in ampfuzz are comparing it to the libraries listed below
Sorting:
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 6 months ago
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆19Dec 17, 2025Updated 3 months ago
- ☆12Jan 30, 2024Updated 2 years ago
- List of all Memcached Servers that are vulnerable to DDoS attack vector☆10Dec 21, 2020Updated 5 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- Implementation of QFuzz.☆17Dec 3, 2021Updated 4 years ago
- hackasat-qualifier-2023-techpapers☆11Jul 17, 2023Updated 2 years ago
- Integrated flight system for REALOP cubesat☆15Mar 24, 2025Updated 11 months ago
- Code from CCS paper: The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning☆13Feb 27, 2023Updated 3 years ago
- ☆17Sep 4, 2023Updated 2 years ago
- Summer internship project for Virginia Space. Created a data diode for one way communication!☆15Aug 10, 2017Updated 8 years ago
- ☆13Jun 30, 2019Updated 6 years ago
- Addressing, networking, database connectors.☆16Jul 11, 2025Updated 8 months ago
- DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained without Shodan API☆22Mar 11, 2019Updated 7 years ago
- This is a project I worked on for my Computer and Communication Networks course during my undergrad EE program.☆13Mar 7, 2021Updated 5 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- aurora-d☆20Apr 24, 2022Updated 3 years ago
- Attacks against QUIC (CVE-2022-30591)☆25Dec 31, 2022Updated 3 years ago
- A malware scanner with Yara and ClamAV binding☆12Apr 16, 2025Updated 11 months ago
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆17Aug 9, 2024Updated last year
- DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers without Shodan Api☆13May 5, 2021Updated 4 years ago
- Companion repository of the "Dancer in the Dark" paper.☆20Jul 13, 2024Updated last year
- A series of small ARM 64 bite-size articles to help one better reverse AArch64 ARM 64 Linux binaries.☆21Nov 27, 2025Updated 3 months ago
- ☆21Mar 17, 2023Updated 3 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 5 years ago
- Data collection, models, and fingerprinting code for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fi…☆25Sep 5, 2025Updated 6 months ago
- ☆19Mar 29, 2018Updated 7 years ago
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆22Aug 30, 2024Updated last year
- ☆12Jul 27, 2017Updated 8 years ago
- Python hashlib-like wrapper for several fuzzy hash algorithms.☆15Apr 26, 2023Updated 2 years ago
- Geometry, curve fitting, optimization.☆19Feb 25, 2026Updated 3 weeks ago
- Official repository for ResolverFuzz☆18Aug 11, 2024Updated last year
- Tools for unpacking and repacking firmware images for the Insta360 X3☆13Sep 19, 2023Updated 2 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Jun 22, 2017Updated 8 years ago
- A Python wrapper library for libyara and a local server for fully utilizing the CPUs of the system to scan with yara...with additional ca…☆19Dec 8, 2022Updated 3 years ago
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- Little Free Radio Firmware☆18Jul 13, 2021Updated 4 years ago
- ☆71May 12, 2025Updated 10 months ago