raminfp / the-art-of-fuzzing
Application Fuzzing: Tools, Techniques, and Best Practices
☆161Updated 6 months ago
Alternatives and similar repositories for the-art-of-fuzzing:
Users that are interested in the-art-of-fuzzing are comparing it to the libraries listed below
- Write fuzzer with rust☆203Updated last year
- ☆108Updated 3 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆276Updated 2 years ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆220Updated last month
- A python module to explore the object tree to extract paths to interesting objects in memory.☆89Updated last month
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆149Updated 4 months ago
- ☆195Updated last month
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆79Updated 2 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆332Updated last year
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆283Updated 3 months ago
- Search engine for CTF writeups with instant results.☆128Updated 2 weeks ago
- HTML Universal Identifier☆64Updated 3 months ago
- HTTP/2 Last Frame Synchronization (also known as Single Packet Attack) low Level Library / Tool based on Scapy + Exploit Timing Attacks☆168Updated 4 months ago
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆338Updated 3 months ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆267Updated last week
- Slides and videos from my public speeches / conferences☆73Updated 3 months ago
- The Search Engine for Cybersecurity☆73Updated 5 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆154Updated 3 months ago
- Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .class…☆266Updated 8 months ago
- ASLR bypass without infoleak☆159Updated 3 years ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆343Updated 3 months ago
- Embed a payload inside a PNG file☆301Updated 5 months ago
- This repository updates latest Bug Bounty medium writeups every 10 minutes, https://readmedium.com/Medium_URL, https://archive.ph/Medium_…☆49Updated this week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆345Updated 5 months ago
- My public notes about offensive security☆155Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆253Updated 10 months ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆31Updated 4 months ago
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆469Updated 3 months ago
- This script Crawl the website and find the urls that contains html forms.☆71Updated 9 months ago
- A vulnerable RESTful application written in Node and React based on OWASP API security top 10 2023 edition.☆52Updated last year