moloch-- / MitmFuzzerLinks
A fuzzing script for MitmProxy
☆22Updated 10 years ago
Alternatives and similar repositories for MitmFuzzer
Users that are interested in MitmFuzzer are comparing it to the libraries listed below
Sorting:
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Updated 12 years ago
- ☆12Updated 9 years ago
- Break Apps with Frida workshop material☆45Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- Format string exploit generation☆10Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆33Updated 9 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- ☆16Updated 9 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆14Updated 2 years ago
- FUD Metasploit Android Payload☆11Updated 9 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Updated 6 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Updated 11 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆18Updated 10 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- Exploit Reliability Testing System☆34Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago