ejcx / wtfLinks
Easily write tests and fuzz many different programs.
☆12Updated 2 years ago
Alternatives and similar repositories for wtf
Users that are interested in wtf are comparing it to the libraries listed below
Sorting:
- Flash crossdomain policy security checker☆26Updated 9 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- ☆12Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Yara Plugin for Binary Ninja☆13Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 9 years ago
- Automatically scans for malicious proxies.☆32Updated 10 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Application Security Vulnerability Periodic Table☆14Updated 11 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Puny Domain Name Check☆37Updated 6 years ago
- A scoreboard for Security CTF events☆37Updated 12 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Vulnerable Grails application☆43Updated 10 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago