in-memory fuzzing with gdb
☆21Feb 10, 2016Updated 10 years ago
Alternatives and similar repositories for fuzzpoints
Users that are interested in fuzzpoints are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- An implementation of the hashcat rules engine in javascript☆49Feb 17, 2018Updated 8 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Mar 1, 2012Updated 14 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- Simple MIPS32 Emulator (primarily used to run SmallerC compiled for MIPS)☆18Oct 31, 2015Updated 10 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Static instrumentation tool for efficient binary-level coverage analysis.☆152Jan 25, 2021Updated 5 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- A library for GDB (with python support), that adds useful functions to the standard 'gdb' library.☆77Oct 25, 2011Updated 14 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- QEMU to drcov trace file☆12Nov 21, 2020Updated 5 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- A prototype system call fuzzer.☆14Apr 16, 2017Updated 8 years ago
- Application whitelisting/blacklisting & end-user notifications for GSuite☆14Apr 19, 2018Updated 7 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Mar 2, 2020Updated 6 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- A transparent proxy that can modify and drop traffic for arbitrary TCP connections.☆276Sep 16, 2019Updated 6 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- ☆13Jun 25, 2016Updated 9 years ago
- IDA Pro Plugins☆19May 31, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- sandbox demo☆11Jan 18, 2024Updated 2 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Alternative hexdump.☆15Feb 4, 2016Updated 10 years ago
- ☆20Jun 23, 2021Updated 4 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- ☆16Mar 23, 2018Updated 8 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago