snoopysecurity / fuzzpayloadsLinks
Collection of fuzzing payloads and corpus from all around added as sub modules
☆15Updated 8 months ago
Alternatives and similar repositories for fuzzpayloads
Users that are interested in fuzzpayloads are comparing it to the libraries listed below
Sorting:
- ☆36Updated 11 months ago
- Default plugins for Jaeles Scanner☆35Updated 5 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Reconness Agents Script☆31Updated 3 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Updated 4 years ago
- A Burp extension to show the Collaborator client in a tab☆24Updated 3 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated last year
- Query various sources for CVE proof-of-concepts☆53Updated 2 years ago
- Python script to launch burp scans automatically☆33Updated 4 years ago
- Ffuf output browser☆40Updated 2 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- A tools for JavaScript Recon☆24Updated 5 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- XSS scanning with Dalfox on Github-action☆26Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 5 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆24Updated 2 years ago
- Tool to extract & validate google fcm server keys from apks☆29Updated 5 years ago
- ☆33Updated last year
- HTTP requests of FrontPage expolit☆26Updated 12 years ago
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Updated 4 years ago
- XXE Injection Payloads☆28Updated 6 years ago
- XMLRPC - RCE in MovableTypePoC☆21Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 4 years ago
- Guide For WAF Bypass Techniques☆28Updated 5 years ago
- Burp extension to generate multi-step CSRF POC.☆31Updated 6 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35Updated last year
- Writeup of CVE-2020-15906☆49Updated 5 years ago