API fuzzer that exposes security flaws by sending malformed inputs
☆16Sep 4, 2024Updated last year
Alternatives and similar repositories for ParaMutator
Users that are interested in ParaMutator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆26Jun 29, 2021Updated 4 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- This repository contains information on the CVEs I found.☆53Mar 10, 2024Updated 2 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities datab…☆18May 18, 2022Updated 4 years ago
- APKdgo is a command-line tool for downloading Android APK files from multiple sources and app stores, making it easy to fetch packages.☆31Mar 10, 2026Updated 2 months ago
- ☆15Sep 27, 2024Updated last year
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Dec 13, 2021Updated 4 years ago
- ☆33Mar 19, 2022Updated 4 years ago
- Various AD tools needed for penetration testing in one place.☆24Jul 13, 2023Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆13Jun 7, 2021Updated 4 years ago
- Standardised setup for researching WordPress plugin- and theme vulnerabilities.☆31Mar 17, 2026Updated 2 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆19May 18, 2025Updated last year
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆90Feb 9, 2025Updated last year
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆37Oct 28, 2025Updated 6 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆41Apr 4, 2025Updated last year
- ☆19Sep 18, 2023Updated 2 years ago
- ☆37Jul 31, 2024Updated last year
- An opensource tool built to help bug bounty hunters and developers to easily/quickly find the perfect command to validate API keys☆25Apr 20, 2025Updated last year
- ☆10Aug 24, 2024Updated last year
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36May 14, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆20Dec 20, 2023Updated 2 years ago
- ☆10Aug 9, 2024Updated last year
- ☆10Sep 10, 2024Updated last year
- Script for generating write-ups templates for CTF challenges 🗃️☆15Feb 5, 2022Updated 4 years ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆64Apr 13, 2025Updated last year
- The easy way to create a working directory with standard report template files for common security scenarios: penetration testing, CTF, t…☆16Jan 5, 2024Updated 2 years ago
- Cyber stalker is a web application based tool to catch fake account users online☆20May 6, 2023Updated 3 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- Deny list generator for password filters☆26Jul 29, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Challenge Python☆19Apr 26, 2023Updated 3 years ago
- Web CTF CheatSheet 🐈☆33Apr 10, 2019Updated 7 years ago
- ☆65Mar 10, 2026Updated 2 months ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated 2 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 6 years ago