raminfp / the-art-of-fuzzing
Application Fuzzing: Tools, Techniques, and Best Practices
☆156Updated 4 months ago
Alternatives and similar repositories for the-art-of-fuzzing:
Users that are interested in the-art-of-fuzzing are comparing it to the libraries listed below
- Write fuzzer with rust☆202Updated last year
- ☆102Updated last month
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆30Updated 3 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆266Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆140Updated 3 months ago
- HTML Universal Identifier☆63Updated 2 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆330Updated last year
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆73Updated last month
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated 10 months ago
- HTTP/2 Last Frame Synchronization (also known as Single Packet Attack) low Level Library / Tool based on Scapy + Exploit Timing Attacks☆165Updated 3 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆211Updated last week
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆245Updated last month
- ☆193Updated last week
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆196Updated 2 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆86Updated 2 weeks ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆153Updated 2 months ago
- Docker Remote API Scanner and Exploit☆160Updated last year
- list of organizations offering vulnerability research/reverse engineering jobs☆62Updated 6 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆321Updated 4 months ago
- Web Penetration Testing Course Materials☆32Updated 9 months ago
- Collection of codes focused on Linux rootkits☆80Updated 2 weeks ago
- Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .class…☆264Updated 6 months ago
- The Search Engine for Cybersecurity☆71Updated 4 months ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆253Updated 8 months ago
- Yet another awesome fuzzers list☆14Updated 3 months ago
- Awesome Privilege Escalation☆96Updated 2 years ago
- A monster cheatsheet on MITM attacks☆324Updated last year
- Browser extension that leverages TruffleHog to scan web traffic in real-time for exposed secrets☆87Updated last month
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆331Updated 2 months ago
- ☆16Updated this week