cytopia / fuzzaLinks
Customizable TCP fuzzing tool to test for remote buffer overflows.
☆52Updated 5 years ago
Alternatives and similar repositories for fuzza
Users that are interested in fuzza are comparing it to the libraries listed below
Sorting:
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago
- An advanced graphical search engine for Exploit-DB☆120Updated last year
- Docker images for learning wifi hacking☆69Updated 7 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆82Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆77Updated 2 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 5 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 5 years ago
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆68Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆68Updated 2 years ago
- Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.☆45Updated 2 years ago
- REST API backend for Reconmap☆46Updated last month
- My pen testing notes☆54Updated 2 years ago
- Various scripts and codes☆84Updated 4 years ago
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 5 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- ☆19Updated 4 years ago
- Brute-force Cisco SSL VPN☆54Updated 5 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- Build interactive map of cameras from Shodan☆23Updated 6 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Updated 2 weeks ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- brute force SSH public-key authentication☆78Updated 8 months ago