Automatically exported from code.google.com/p/fuzzdb
☆14Jun 23, 2015Updated 10 years ago
Alternatives and similar repositories for fuzzdb
Users that are interested in fuzzdb are comparing it to the libraries listed below
Sorting:
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 11 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- ☆16Mar 31, 2017Updated 8 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- Syn flood implementation with raw sockets.☆13Nov 24, 2014Updated 11 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- simple reverse tcp backdoor hack☆63Oct 2, 2020Updated 5 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Jun 30, 2015Updated 10 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Aug 4, 2016Updated 9 years ago
- SMBMap is a handy SMB enumeration tool☆38Jun 18, 2024Updated last year
- Nmap enumeration and script scan automation script☆38Mar 7, 2023Updated 2 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago