rmadair / fuzzerLinks
A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full details.
☆52Updated 9 years ago
Alternatives and similar repositories for fuzzer
Users that are interested in fuzzer are comparing it to the libraries listed below
Sorting:
- The Zulu fuzzer☆125Updated 7 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 8 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago
- Exploits for interesting CTF challenges I have worked on☆65Updated 8 years ago
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- softScheck Cloud Fuzzing Framework☆58Updated 7 years ago
- windows kernel vulnerability found by me☆90Updated 7 years ago
- Hodor! Fuzzer..☆129Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 9 years ago
- Peach Fuzzer Web Frontend☆52Updated 4 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Updated 9 years ago
- PoC for CVE-2015-6086☆69Updated 9 years ago
- ☆93Updated 7 years ago
- A MS OpenXML Format Fuzzing Framework☆84Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- Source for some problems from PlaidCTF 2014.☆58Updated 11 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- HitCon 2015 spartan 0day & exploit☆27Updated 9 years ago
- hax 'n shit☆119Updated 10 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 7 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- ☆52Updated 10 years ago
- GUI tool to create ROP chains using the ropper API☆157Updated 7 years ago