raminfp / the-art-of-fuzzing
Application Fuzzing: Tools, Techniques, and Best Practices
☆150Updated last month
Related projects ⓘ
Alternatives and complementary repositories for the-art-of-fuzzing
- Write fuzzer with rust☆194Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆280Updated last month
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆139Updated last month
- My public notes about offensive security☆147Updated 10 months ago
- ASLR bypass without infoleak☆152Updated 3 years ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆225Updated 3 weeks ago
- Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets☆154Updated this week
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆83Updated last month
- Awesome Privilege Escalation☆80Updated 2 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆78Updated 8 months ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆112Updated 7 months ago
- The Search Engine for Cybersecurity☆66Updated last month
- Web Penetration Testing Course Materials☆33Updated 5 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆60Updated 3 months ago
- Slides and videos from my public speeches / conferences☆70Updated 2 weeks ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆196Updated this week
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆242Updated last week
- HTTP/2 Single Packet Attack low Level Library / Tool based on Scapy + Exploit Timing Attacks☆138Updated last week
- Embed a payload inside a PNG file☆201Updated 2 weeks ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆142Updated 2 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆338Updated 2 months ago
- Docker Remote API Scanner and Exploit☆152Updated 11 months ago
- This script Crawl the website and find the urls that contains html forms.☆70Updated 4 months ago
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probing☆56Updated last year
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆140Updated last year
- ☆55Updated 7 months ago
- Some tips for Bug Bounty using LibreOffice☆32Updated 3 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆105Updated 7 months ago