cytopia / fuzzaLinks
Customizable TCP fuzzing tool to test for remote buffer overflows.
☆49Updated 5 years ago
Alternatives and similar repositories for fuzza
Users that are interested in fuzza are comparing it to the libraries listed below
Sorting:
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆103Updated 6 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆65Updated last year
- Custom pentesting tools☆25Updated 4 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆26Updated 5 years ago
- Simple Karma Attack☆69Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆68Updated 7 months ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆21Updated 4 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆40Updated 3 months ago
- polymorphic webshells☆30Updated 7 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 3 years ago
- A quick reference script that can easily display reverse shells for different languages.☆21Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- ☆29Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- ☆20Updated 3 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆18Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago