in-memory fuzzing with gdb
☆21Feb 10, 2016Updated 10 years ago
Alternatives and similar repositories for fuzzpoints
Users that are interested in fuzzpoints are comparing it to the libraries listed below
Sorting:
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- An implementation of the hashcat rules engine in javascript☆49Feb 17, 2018Updated 8 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Mar 1, 2012Updated 14 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- Simple MIPS32 Emulator (primarily used to run SmallerC compiled for MIPS)☆18Oct 31, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Static instrumentation tool for efficient binary-level coverage analysis.☆152Jan 25, 2021Updated 5 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- A library for GDB (with python support), that adds useful functions to the standard 'gdb' library.☆77Oct 25, 2011Updated 14 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- QEMU to drcov trace file☆12Nov 21, 2020Updated 5 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- A prototype system call fuzzer.☆14Apr 16, 2017Updated 8 years ago
- Application whitelisting/blacklisting & end-user notifications for GSuite☆14Apr 19, 2018Updated 7 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Mar 2, 2020Updated 6 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- A transparent proxy that can modify and drop traffic for arbitrary TCP connections.☆276Sep 16, 2019Updated 6 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- ☆13Jun 25, 2016Updated 9 years ago
- IDA Pro Plugins☆19May 31, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- sandbox demo☆11Jan 18, 2024Updated 2 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- ☆20Jun 23, 2021Updated 4 years ago
- Some tee/trustzone helper stuff☆55Sep 29, 2019Updated 6 years ago
- OCB-AES authenticated encryption for Python☆14Oct 22, 2021Updated 4 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- ☆16Mar 23, 2018Updated 7 years ago