strozfriedberg / FizzerLinks
Fizzer is an assessment tool for fuzzing FIX messages.
☆29Updated 4 years ago
Alternatives and similar repositories for Fizzer
Users that are interested in Fizzer are comparing it to the libraries listed below
Sorting:
- FIX (Financial Information eXchange) protocol fuzzer☆24Updated 3 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- BurpCSJ extension for Burp Pro - Crawljax Selenium JUnit integration☆34Updated 11 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 4 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- ☆58Updated 11 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆35Updated 8 years ago
- CANAPE Network Testing Tool☆33Updated 7 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated last year
- Dig through Git commits and logs☆21Updated 7 years ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆30Updated 12 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Updated 9 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Updated 9 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- Lite version of PDF X-RAY that uses no backend☆38Updated 14 years ago
- Parse nmap scan data with Perl (official repo)☆37Updated 7 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 6 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- Oracle Database 12c password brute forcer☆29Updated 10 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Updated 9 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- Fully undetected backdoor with RSA Encrypted shell☆11Updated 8 years ago
- ☆23Updated 11 years ago