cytopia / fuzzaLinks
Customizable TCP fuzzing tool to test for remote buffer overflows.
☆52Updated 5 years ago
Alternatives and similar repositories for fuzza
Users that are interested in fuzza are comparing it to the libraries listed below
Sorting:
- Tool to identify routers on the local LAN and paths to the Internet☆66Updated last year
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 months ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆106Updated 6 years ago
- Various scripts and codes☆84Updated 4 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago
- A WLAN red team framework.☆154Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆89Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Kraker is a distributed password brute-force system that focused on easy use.☆83Updated 6 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 4 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆75Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.☆45Updated last year
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆20Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆68Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- REST API backend for Reconmap☆46Updated this week
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago