API fuzzer that exposes security flaws by sending malformed inputs
☆16Sep 4, 2024Updated last year
Alternatives and similar repositories for ParaMutator
Users that are interested in ParaMutator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆25Jun 29, 2021Updated 4 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- This repository contains information on the CVEs I found.☆52Mar 10, 2024Updated 2 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- this repository made to help me All Dorking repositories find for one location☆36Aug 31, 2025Updated 6 months ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Dec 13, 2021Updated 4 years ago
- ☆35Mar 19, 2022Updated 4 years ago
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- ☆43Nov 21, 2024Updated last year
- ☆19May 18, 2025Updated 10 months ago
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆89Feb 9, 2025Updated last year
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 4 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. � …☆42Apr 4, 2025Updated 11 months ago
- ☆19Sep 18, 2023Updated 2 years ago
- ☆35Jul 31, 2024Updated last year
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- ☆10Aug 24, 2024Updated last year
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36May 14, 2022Updated 3 years ago
- ☆10Aug 9, 2024Updated last year
- This is a simple mix task to version bump a mix project.☆11Feb 18, 2020Updated 6 years ago
- Script for generating write-ups templates for CTF challenges 🗃️☆15Feb 5, 2022Updated 4 years ago
- ☆10Sep 10, 2024Updated last year
- Security research organization dedicated to finding low hanging, critical, vulnerabilities.☆15May 12, 2022Updated 3 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- Intercept php includes☆16Dec 23, 2019Updated 6 years ago
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- ☆14Jun 4, 2024Updated last year
- sturdy-chainsaw☆70Aug 10, 2023Updated 2 years ago
- Web CTF CheatSheet 🐈☆33Apr 10, 2019Updated 6 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Yet another json builder in Golang helping you write json strings safely.☆11Apr 14, 2016Updated 9 years ago
- Systemback_source-1.9.4☆15Jan 2, 2021Updated 5 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- This is Hackintosh EFI for my laptop HP 15 based on OpenCore.☆14Jan 12, 2022Updated 4 years ago
- Elixir Websocket - Kitchen Sink Not Included☆18Jun 16, 2024Updated last year
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago