droberson / thefuzz
Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran from the command line.
☆10Updated 7 years ago
Alternatives and similar repositories for thefuzz:
Users that are interested in thefuzz are comparing it to the libraries listed below
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Updated 11 years ago
- ☆11Updated 6 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Updated 5 years ago
- PoC for CVE-2020-11651☆6Updated 4 years ago
- Hack In Paris 2018 Slideware☆17Updated 6 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 7 years ago
- "HeaderScan" Burp Plugin☆16Updated 10 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 6 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- A fuzzing script for MitmProxy☆22Updated 9 years ago
- ☆11Updated 7 years ago
- ☆14Updated 7 years ago
- Application Security library☆11Updated 12 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Updated 11 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Updated 6 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- Repository of Information sharing on threats and indicators☆12Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Format string exploit generation☆10Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Converts burp's sitemap to sulley's fuzzing script☆12Updated 9 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆10Updated 8 years ago