raminfp / the-art-of-fuzzing
Application Fuzzing: Tools, Techniques, and Best Practices
☆164Updated 7 months ago
Alternatives and similar repositories for the-art-of-fuzzing
Users that are interested in the-art-of-fuzzing are comparing it to the libraries listed below
Sorting:
- Write fuzzer with rust☆203Updated last year
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆285Updated 2 years ago
- HTML Universal Identifier☆64Updated 5 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆154Updated 6 months ago
- ☆115Updated 4 months ago
- Search engine for CTF writeups with instant results.☆138Updated 2 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆126Updated last month
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆340Updated last year
- ☆199Updated 3 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆296Updated 3 weeks ago
- My public notes about offensive security☆156Updated last year
- list of organizations offering vulnerability research/reverse engineering jobs☆63Updated last month
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆360Updated 4 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 3 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆304Updated 5 months ago
- This repository updates latest Bug Bounty medium writeups every 10 minutes, https://readmedium.com/Medium_URL, https://archive.ph/Medium_…☆70Updated this week
- Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .class…☆270Updated 9 months ago
- Docker Remote API Scanner and Exploit☆171Updated last year
- HTTP/2 Last Frame Synchronization (also known as Single Packet Attack) low Level Library / Tool based on Scapy + Exploit Timing Attacks☆175Updated 6 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆226Updated 3 months ago
- Slides and videos from my public speeches / conferences☆74Updated last month
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆295Updated 2 weeks ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆382Updated 7 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆237Updated 7 months ago
- ☆60Updated last year
- HTTP redirection service designed to help bypass SSRF filters. Integrated with Burp Suite.☆35Updated last month
- Extracts URLs from OSINT Archives for Security Insights☆106Updated 3 weeks ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆158Updated 5 months ago
- ☆28Updated 2 months ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year