API fuzzer that exposes security flaws by sending malformed inputs
☆16Sep 4, 2024Updated last year
Alternatives and similar repositories for ParaMutator
Users that are interested in ParaMutator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆25Jun 29, 2021Updated 4 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- This repository contains information on the CVEs I found.☆53Mar 10, 2024Updated 2 years ago
- Gungnir - Homelab Automation Tool to Guard your very own Asgard☆16Jan 26, 2026Updated 3 months ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities datab…☆18May 18, 2022Updated 3 years ago
- APKdgo is a command-line tool for downloading Android APK files from multiple sources and app stores, making it easy to fetch packages.☆30Mar 10, 2026Updated last month
- ☆34Mar 19, 2022Updated 4 years ago
- Various AD tools needed for penetration testing in one place.☆24Jul 13, 2023Updated 2 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆13Jun 7, 2021Updated 4 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- Standardised setup for researching WordPress plugin- and theme vulnerabilities.☆31Mar 17, 2026Updated last month
- ☆19May 18, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆90Feb 9, 2025Updated last year
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆36Oct 28, 2025Updated 6 months ago
- ☆19Sep 18, 2023Updated 2 years ago
- ☆36Jul 31, 2024Updated last year
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- An opensource tool built to help bug bounty hunters and developers to easily/quickly find the perfect command to validate API keys☆25Apr 20, 2025Updated last year
- ☆10Aug 24, 2024Updated last year
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆63Apr 13, 2025Updated last year
- Security research organization dedicated to finding low hanging, critical, vulnerabilities.☆15May 12, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The easy way to create a working directory with standard report template files for common security scenarios: penetration testing, CTF, t…☆16Jan 5, 2024Updated 2 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- Intercept php includes☆16Dec 23, 2019Updated 6 years ago
- Challenge Python☆19Apr 26, 2023Updated 3 years ago
- Web CTF CheatSheet 🐈☆33Apr 10, 2019Updated 7 years ago
- ☆65Mar 10, 2026Updated last month
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Live Dangerous Linux Malware Samples!☆22May 5, 2020Updated 5 years ago
- Systemback_source-1.9.4☆15Jan 2, 2021Updated 5 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 6 years ago
- Listen to Supervisor events in PHP☆14Dec 12, 2022Updated 3 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- A simple tool to interact with web shells and command injection vulnerabilities☆36Nov 26, 2024Updated last year
- Elixir Websocket - Kitchen Sink Not Included☆18Jun 16, 2024Updated last year