vuusale / ParaMutatorLinks
API fuzzer that exposes security flaws by sending malformed inputs
☆16Updated 9 months ago
Alternatives and similar repositories for ParaMutator
Users that are interested in ParaMutator are comparing it to the libraries listed below
Sorting:
- ☆21Updated this week
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated 2 weeks ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated 2 weeks ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- Tools used for Pentesting☆22Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 9 months ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- ☆24Updated 6 years ago
- Labs & Code snippets for RRT on TTI☆40Updated 2 years ago
- A Burp extension to help pentesters copy requests / responses for reports.☆38Updated 2 weeks ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆15Updated last month
- This repository contains information on the CVEs I found.☆44Updated last year
- Damn Vulnerable Rails app☆12Updated 12 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated last year
- ☆12Updated 7 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆27Updated 8 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- ☆27Updated 2 years ago
- Tool for scanning domains for .git directories.☆16Updated last year
- ☆26Updated 2 years ago
- ☆46Updated 2 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- OSCP Study Guide☆40Updated 2 years ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆65Updated 6 months ago