Faraday Workspaces for Bug Bounties
☆21Jan 19, 2016Updated 10 years ago
Alternatives and similar repositories for faraday_bugbounty
Users that are interested in faraday_bugbounty are comparing it to the libraries listed below
Sorting:
- Faraday Continuous Scanning☆34Sep 29, 2016Updated 9 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- HMAC timing attack's w/ statistical analysis☆23Sep 19, 2013Updated 12 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆48Mar 13, 2026Updated last week
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- A tool (and library) for TACKs☆31Jun 15, 2017Updated 8 years ago
- A set of XSS vulnerable PHP scripts for testing☆39Feb 10, 2013Updated 13 years ago
- ☆34Aug 5, 2015Updated 10 years ago
- Cross-platform radio signal visualizer for HackRF & other SDR platforms.☆17Oct 1, 2020Updated 5 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20May 18, 2016Updated 9 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Binary Ninja Plugin for devi - see https://github.com/murx-/devi/ for devi details☆20Jan 17, 2024Updated 2 years ago
- Educational Exploitable Web Application☆24Feb 9, 2016Updated 10 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- ☆55Jul 18, 2017Updated 8 years ago
- c programming☆10Oct 31, 2020Updated 5 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- ☆11Jan 14, 2018Updated 8 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Android app to bypass SSL certificate validation (Certificate Pinning).☆16Feb 7, 2016Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago