raminfp / the-art-of-fuzzingLinks
Application Fuzzing: Tools, Techniques, and Best Practices
☆165Updated 8 months ago
Alternatives and similar repositories for the-art-of-fuzzing
Users that are interested in the-art-of-fuzzing are comparing it to the libraries listed below
Sorting:
- Write fuzzer with rust☆204Updated last year
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆286Updated 2 years ago
- The most complete code auditing platform with thousands of real-world challenges☆72Updated 2 weeks ago
- ☆117Updated 5 months ago
- My public notes about offensive security☆155Updated last year
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆341Updated last year
- ☆199Updated 4 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆227Updated 4 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆311Updated 6 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆128Updated 2 months ago
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆365Updated 5 months ago
- Slides and videos from my public speeches / conferences☆74Updated last week
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆306Updated last week
- HTTP/2 Last Frame Synchronization (also known as Single Packet Attack) low Level Library / Tool based on Scapy + Exploit Timing Attacks☆177Updated last week
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆156Updated 6 months ago
- Search engine for CTF writeups with instant results.☆142Updated 2 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆223Updated 3 weeks ago
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆200Updated 2 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆84Updated 5 months ago
- Docker Remote API Scanner and Exploit☆171Updated last year
- Web Penetration Testing Course Materials☆32Updated last year
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆483Updated last month
- Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .class…☆273Updated 10 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆64Updated 2 months ago
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆106Updated 5 months ago
- Cloud, WEB, API☆136Updated 3 months ago
- ASLR bypass without infoleak☆161Updated 3 years ago
- Massive Mobile Security Framework☆284Updated last week
- A vulnerable RESTful application written in Node and React based on OWASP API security top 10 2023 edition.☆53Updated last year
- Extracts URLs from OSINT Archives for Security Insights☆115Updated 2 weeks ago