Java fuzz testing library for implementations of ABNF rules such as IETF RFCs
☆34Sep 26, 2024Updated last year
Alternatives and similar repositories for abnffuzzer
Users that are interested in abnffuzzer are comparing it to the libraries listed below
Sorting:
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- Result files from various fuzzing runs☆16Oct 18, 2021Updated 4 years ago
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Sep 23, 2025Updated 5 months ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- OUSPG Open - Summer of Buzz with Fresh Blood, Alumni and Affiliates☆20Dec 2, 2016Updated 9 years ago
- A tool for automatic black-box detection of missing hostname verification, including for applications that use certificate pinning.☆19Feb 13, 2019Updated 7 years ago
- Implementation of ECDAA☆23Nov 10, 2017Updated 8 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Feb 11, 2026Updated 3 weeks ago
- A docker example for privilege escalation☆25Jul 17, 2017Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Apr 10, 2022Updated 3 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- An automated setup for fuzzing Redis w/ AFL++☆35Mar 12, 2022Updated 3 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- Repository to showcase various configuration recipes with various technologies☆36Dec 16, 2022Updated 3 years ago
- Scripts that we use for pentesting☆42Feb 24, 2017Updated 9 years ago
- Dynamic mode decomposition in Python☆13Jun 9, 2015Updated 10 years ago
- Determines whether the current OS X computer's firmware is up-to-date.☆10Feb 24, 2015Updated 11 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- ☆10Apr 30, 2024Updated last year
- ☆99Oct 19, 2020Updated 5 years ago
- learning case to prepare OSWE☆36Nov 4, 2019Updated 6 years ago
- Extra/staging vitasdk packages.☆17Aug 10, 2025Updated 6 months ago
- ☆13Sep 15, 2024Updated last year
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- ☆10Oct 7, 2017Updated 8 years ago
- ☆10Sep 25, 2024Updated last year
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago
- ☆14Mar 8, 2018Updated 7 years ago
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated last month
- This is a library for stealing browser passwords, crypto stuff, password manager extension stuff, and just general applications too☆11May 10, 2024Updated last year
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- 123123☆16Dec 31, 2025Updated 2 months ago
- llvm Call Graph分析☆10May 27, 2017Updated 8 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑☆11Sep 3, 2021Updated 4 years ago