raminfp / the-art-of-fuzzingView external linksLinks
Application Fuzzing: Tools, Techniques, and Best Practices
☆175Sep 23, 2024Updated last year
Alternatives and similar repositories for the-art-of-fuzzing
Users that are interested in the-art-of-fuzzing are comparing it to the libraries listed below
Sorting:
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆126Nov 15, 2025Updated 3 months ago
- Write fuzzer with rust☆213Sep 9, 2023Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- ☆62Dec 13, 2025Updated 2 months ago
- ☆19Aug 26, 2020Updated 5 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 9 months ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆15Nov 24, 2023Updated 2 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- using ML models for red teaming☆42Aug 9, 2023Updated 2 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆12Apr 22, 2025Updated 9 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆70Feb 3, 2024Updated 2 years ago
- A CLI tool that bundles source code files into a single context for LLM prompts☆21Jan 9, 2025Updated last year
- A personal list of various resources for those who are interested in learning about infosec and hacking and keeping themselves up to date…☆177Jul 27, 2025Updated 6 months ago
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- ☆38Dec 14, 2024Updated last year
- WebGL fuzzer☆39Mar 13, 2023Updated 2 years ago
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated last month
- PoC for CVE-2024-27130☆37May 17, 2024Updated last year
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Simple tmux session management.☆16Dec 16, 2023Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆63Mar 14, 2024Updated last year
- An educational Bochs-based snapshot fuzzer project☆226Oct 27, 2025Updated 3 months ago
- Cybersecurity oriented awesome list☆3,044Feb 8, 2026Updated last week
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆13Jun 24, 2025Updated 7 months ago
- Local encrypt and decrypt telegram messages using secret keys.☆39Oct 12, 2024Updated last year
- ☆49Nov 3, 2023Updated 2 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Feb 12, 2025Updated last year
- ☆130Nov 12, 2024Updated last year
- ☆33Jul 4, 2023Updated 2 years ago