Collection of fuzzing payloads and corpus from all around added as sub modules
☆15May 17, 2025Updated 10 months ago
Alternatives and similar repositories for fuzzpayloads
Users that are interested in fuzzpayloads are comparing it to the libraries listed below
Sorting:
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Mar 11, 2026Updated last week
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- 一些渗透测试学习笔记☆13Jul 22, 2022Updated 3 years ago
- Audit your Node version for known CVEs and patches☆26Aug 20, 2025Updated 7 months ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- A terminal tool for exploring postgres query plans.☆13Feb 27, 2026Updated 3 weeks ago
- huntr.dev public disclosures/hacktivity watcher☆17Nov 5, 2023Updated 2 years ago
- Burp-Addons : Some of Burp Addons I use ( Mindak ak fahem )☆11Sep 1, 2022Updated 3 years ago
- CVE-2021-40438 exploit PoC with Docker setup.☆12Oct 24, 2021Updated 4 years ago
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆32Jun 20, 2024Updated last year
- AWVS13和xray的自动化扫描脚本☆15Aug 10, 2020Updated 5 years ago
- Several XStream gadgets ported from ysoserial☆33Sep 26, 2021Updated 4 years ago
- Jenkins Plugin from Contrast Security☆13Aug 9, 2024Updated last year
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- [W.I.P] An ecosystem of crawlers for detecting: leaks, sensitive data exposure and attempts exfiltration of data☆32Mar 13, 2026Updated last week
- Asynchronous public DNS auditing tool☆11May 22, 2023Updated 2 years ago
- ☆55Aug 17, 2023Updated 2 years ago
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆21Jul 29, 2018Updated 7 years ago
- ☆25Apr 30, 2021Updated 4 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- A collection of Security Bookmarks☆11Oct 9, 2021Updated 4 years ago
- Developers Excuses☆11May 28, 2016Updated 9 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- InfraSight is a modular eBPF-based observability platform for Linux and Kubernetes environments. It provides deep visibility into system …☆35Oct 14, 2025Updated 5 months ago
- ☆15Sep 11, 2020Updated 5 years ago
- ☆15Apr 5, 2023Updated 2 years ago
- ☆13Updated this week
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- Burp Suite plugin that allow to deserialize Java objects and convert them in an XML format. Unpack also gzip responses. Based on BurpJDSe…☆19Feb 2, 2024Updated 2 years ago
- Pentest Q&A trick written in Vietnamese☆11May 16, 2019Updated 6 years ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Oct 17, 2024Updated last year
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Jan 20, 2017Updated 9 years ago
- Dotmil subdomain discovery tool that scrapes domains from official DoD website directories and certificate transparency logs☆94Jan 21, 2021Updated 5 years ago