A log collector for Peach fuzzing in the cloud
☆28Apr 2, 2014Updated 11 years ago
Alternatives and similar repositories for PeachFarmer
Users that are interested in PeachFarmer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- A multi-codec media fuzzing tool.☆43Oct 9, 2012Updated 13 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 4 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Peach Fuzzer PIT Files☆21Aug 12, 2013Updated 12 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 10 years ago
- RTSP network protocol fuzzer☆64Mar 19, 2014Updated 12 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- A TrustedBSD module to control execution of binaries with suid bit set☆38Oct 3, 2014Updated 11 years ago
- Binary Analysis Platform☆74Oct 21, 2013Updated 12 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆126Jan 15, 2019Updated 7 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Small util to dump the IDT table of a running OS X system with kmem enabled☆21May 5, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- QUANTUM-DNS server☆20Jul 16, 2019Updated 6 years ago
- miscellaneous scripts and things...☆22May 12, 2016Updated 9 years ago
- Engine for communication with remote kernel debugger (KD, WinDbg) from drivers and applications☆37Jun 8, 2013Updated 12 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 13 years ago
- Basic script to rotate through reverse SSH proxies built through EC2, useful for obfuscating (weakly anonymizing) your source. Nice for b…☆13Mar 6, 2015Updated 11 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A PoC Mach-O infector via library injection☆65Mar 5, 2013Updated 13 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Oct 3, 2021Updated 4 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Apr 16, 2015Updated 10 years ago
- OpenType font file format fuzzer for Windows☆52Jun 8, 2013Updated 12 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- Polar : Function Code Aware Fuzz Testing of ICS Protocol☆34Jan 12, 2021Updated 5 years ago