cytopia / fuzzaLinks
Customizable TCP fuzzing tool to test for remote buffer overflows.
☆52Updated 5 years ago
Alternatives and similar repositories for fuzza
Users that are interested in fuzza are comparing it to the libraries listed below
Sorting:
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago
- Various scripts and codes☆84Updated 4 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆75Updated last year
- Tool to identify routers on the local LAN and paths to the Internet☆67Updated last year
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Updated 4 years ago
- Build interactive map of cameras from Shodan☆23Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- Kraker is a distributed password brute-force system that focused on easy use.☆83Updated 6 months ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆89Updated 4 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- brute force SSH public-key authentication☆77Updated 7 months ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 4 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Updated 7 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Extract credentials and other useful info from network captures☆75Updated 3 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 6 years ago