fuzzdb-project / fuzzdbLinks
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
☆8,596Updated last year
Alternatives and similar repositories for fuzzdb
Users that are interested in fuzzdb are comparing it to the libraries listed below
Sorting:
- Web application fuzzer☆6,233Updated 11 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,824Updated 3 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,472Updated last year
- A Tool for Domain Flyovers☆5,803Updated 3 years ago
- Next generation web scanner☆5,969Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,340Updated this week
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,995Updated last year
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆5,773Updated 6 months ago
- Linux privilege escalation auditing tool☆6,060Updated last year
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,372Updated 9 months ago
- Fast web fuzzer written in Go☆14,330Updated 2 months ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆5,969Updated 2 months ago
- Git All the Payloads! A collection of web attack payloads.☆3,803Updated 2 years ago
- Web path scanner☆13,130Updated last month
- HTTP parameter discovery suite.☆5,750Updated 5 months ago
- A swiss army knife for pentesting networks☆8,830Updated last year
- Weaponized web shell☆3,341Updated 9 months ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,864Updated 8 months ago
- Automated NoSQL database enumeration and web application exploitation tool.☆3,116Updated last month
- A curated list of amazingly awesome Burp Extensions☆3,230Updated 5 months ago
- 🔥 Web-application firewalls (WAFs) from security standpoint.☆6,788Updated 8 months ago
- Fast subdomains enumeration tool for penetration testers☆10,486Updated 11 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,334Updated last year
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,260Updated 5 months ago
- In-depth attack surface mapping and asset discovery☆13,254Updated this week
- Monitor linux processes without root permissions☆5,563Updated 2 years ago
- Adversary Emulation Framework☆9,670Updated 3 weeks ago
- A repository with 3 tools for pwn'ing websites with .git repositories available☆4,042Updated 2 years ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,038Updated this week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,111Updated this week