QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications
☆46May 16, 2024Updated last year
Alternatives and similar repositories for QRFuzz
Users that are interested in QRFuzz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆41Jan 23, 2026Updated 2 months ago
- CVE-2023-6875 PoC☆25Jan 15, 2024Updated 2 years ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Dec 2, 2024Updated last year
- The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for mult…☆19Oct 18, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Erebus is a payload generator written in Nim.☆17Jun 13, 2023Updated 2 years ago
- Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"☆22Oct 12, 2025Updated 5 months ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- The iOS Reloader is a weaponizing tool for jailbroken iOS devices. It facilitates the installation of a collection of tools on iOS device…☆17Sep 15, 2025Updated 6 months ago
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated 3 weeks ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- ☆28Oct 2, 2025Updated 5 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Script will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated…☆31Aug 2, 2019Updated 6 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆17Feb 19, 2025Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- WaybackURLS + OtxURLS + CommonCrawl = The Best Results☆21Dec 7, 2019Updated 6 years ago
- fx2lafw is a free/libre/open-source firmware for logic analyzers based on the Cypress EZ-USB FX2(LP) chip.☆12Aug 2, 2012Updated 13 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques. It automates the process of discovering the real orig…☆171Feb 22, 2026Updated last month
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Mar 24, 2023Updated 3 years ago
- Microsoft Entra ID Temporary Access Pass (TAP) Onboarding using ASP.NET Core and Microsoft Graph☆19May 10, 2025Updated 10 months ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆16Mar 22, 2023Updated 3 years ago
- Cybersecurity Psychology Framework☆20Feb 22, 2026Updated last month
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆37Apr 12, 2024Updated last year
- ☆18Dec 9, 2023Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- E²VA short for Exploitation Experience with Vulnerable App is a vulnerable app to learn userspace exploitation on Android☆17Sep 18, 2023Updated 2 years ago
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆43Dec 4, 2025Updated 3 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Apr 6, 2025Updated 11 months ago
- gh0str3con is a All in one cloud based web Recon tool.☆24Jul 8, 2024Updated last year
- A minimal example for Python web prototyping☆12Jun 27, 2016Updated 9 years ago
- Fetch information about a public Google document.☆13Aug 4, 2023Updated 2 years ago
- Physical Devices-Agnostic Hybrid Fuzzing of IoT Firmware☆12Mar 6, 2024Updated 2 years ago
- SyzTrust's main repository. Start here to install.☆19Feb 29, 2024Updated 2 years ago