protocol fuzzing toolkit
☆128Jun 10, 2019Updated 6 years ago
Alternatives and similar repositories for backfuzz
Users that are interested in backfuzz are comparing it to the libraries listed below
Sorting:
- RTSP network protocol fuzzer☆65Mar 19, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Mar 17, 2015Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- IKE fuzzer☆29May 29, 2015Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Protocol Learning and Stateful Fuzzing☆355Jun 7, 2022Updated 3 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Feb 4, 2015Updated 11 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Apr 10, 2022Updated 3 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- A distributed fuzzing testing suite with web administration☆374Jan 14, 2019Updated 7 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- ☆64Oct 24, 2015Updated 10 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- A Browser Fuzzer for Vulnerbilities☆66Mar 20, 2015Updated 10 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Network based protocol fuzzer☆74Feb 17, 2022Updated 4 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Apr 16, 2015Updated 10 years ago
- Fuzzing framework written in python☆434Aug 4, 2024Updated last year
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- ☆10Sep 29, 2019Updated 6 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- OpenType font file format fuzzer for Windows☆52Jun 8, 2013Updated 12 years ago