API fuzzer that exposes security flaws by sending malformed inputs
☆16Sep 4, 2024Updated last year
Alternatives and similar repositories for ParaMutator
Users that are interested in ParaMutator are comparing it to the libraries listed below
Sorting:
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆25Jun 29, 2021Updated 4 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- This repository contains information on the CVEs I found.☆52Mar 10, 2024Updated last year
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities datab…☆17May 18, 2022Updated 3 years ago
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- Standardised setup for researching WordPress plugin- and theme vulnerabilities.☆29Updated this week
- ☆35Jul 31, 2024Updated last year
- ☆10Sep 10, 2024Updated last year
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- Deny list generator for password filters☆26Jul 29, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- ☆35Mar 19, 2022Updated 3 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆37Apr 12, 2024Updated last year
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆94Feb 16, 2024Updated 2 years ago
- ☆61Jun 28, 2025Updated 8 months ago
- Extension adds a new tab in Burp Suite called Extractor☆42Apr 13, 2019Updated 6 years ago
- Security research organization dedicated to finding low hanging, critical, vulnerabilities.☆15May 12, 2022Updated 3 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- A standard-derived suite of cryptography libraries for the TI-84+ CE graphing calculator.☆14Jan 24, 2026Updated last month
- ☆43Nov 21, 2024Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆42Apr 4, 2025Updated 10 months ago
- POC & $BASH script for CVE-2024-4577☆44Jun 9, 2024Updated last year
- ☆11Sep 14, 2020Updated 5 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- ☆12Dec 15, 2024Updated last year
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- ☆10Aug 9, 2024Updated last year
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- ☆14Nov 16, 2024Updated last year
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Wireless Network Programming - The Linux Way☆10Jan 19, 2016Updated 10 years ago
- ☆11Jul 15, 2024Updated last year
- POC☆12Apr 26, 2022Updated 3 years ago
- ☆12Nov 15, 2021Updated 4 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- CSS injection requires an attacker to load a standalone CSS file to leak HTML tag attributes.☆20Apr 19, 2024Updated last year
- ☆12Feb 20, 2025Updated last year
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago