raminfp / the-art-of-fuzzingLinks
Application Fuzzing: Tools, Techniques, and Best Practices
☆174Updated last year
Alternatives and similar repositories for the-art-of-fuzzing
Users that are interested in the-art-of-fuzzing are comparing it to the libraries listed below
Sorting:
- Write fuzzer with rust☆212Updated 2 years ago
- The most complete code auditing platform with thousands of real-world challenges☆135Updated 6 months ago
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆207Updated last month
- ☆123Updated last year
- Search engine for CTF writeups with instant results.☆152Updated 10 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆334Updated 2 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- list of organizations offering vulnerability research/reverse engineering jobs☆105Updated 4 months ago
- Just A list Of Some Multilingual XSS Payloads and other weird ones i made☆123Updated 3 months ago
- HTML Universal Identifier☆65Updated last year
- Slides and videos from my public speeches / conferences☆80Updated last week
- AI-powered workflow automation and AI Agents platform for AppSec, Fuzzing & Offensive Security. Automate vulnerability discovery with int…☆680Updated 2 months ago
- An archive of 0day.today exploits☆331Updated 5 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆179Updated 9 months ago
- Reverse engineering CTFs.☆62Updated 3 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 11 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆87Updated 2 months ago
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 5 months ago
- ☆236Updated last year
- As a bug hunter, are your bug bounty reports getting rejected because you don't use a "malicious" Proof of Concept (PoC) app to exploit t…☆126Updated last month
- This repository houses diverse files and challenges centered around Just Mobile Security. With practical exercises and resources aimed at…☆13Updated last year
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆40Updated last year
- Official writeups for Business CTF 2024: The Vault Of Hope☆158Updated last year
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆353Updated 2 years ago
- My public notes about offensive security☆166Updated 4 months ago
- Hack-A-Sat Qualifiers Writeups☆259Updated 3 years ago
- ☆75Updated 2 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 11 months ago
- Gonna share my writeups and resources here☆70Updated last year