A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Aug 8, 2021
{{ message }}
A collection of various awesome lists for hackers, pentesters and security researchers
Web path scanner
OSS-Fuzz - continuous fuzzing for open source software.
Hypothesis is a powerful, flexible, and easy to use library for property-based testing.
the champagne of beta embedded databases
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
Web Pentesting Fuzz 字典,一个就够了。
syzkaller is an unsupervised coverage-guided kernel fuzzer
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Property based testing framework for JavaScript (like QuickCheck) written in TypeScript
A high performance offensive security tool for reconnaissance and vulnerability scanning
Hi, I also have a question regarding the custom post processor.
In the example https://github.com/AFLplusplus/AFLplusplus/blob/stable/custom_mutators/examples/post_library_gif.so.c#L48 it is mentioned that if the post process function returns 0 the input is not sent to the target program and fuzzing is continued. When I tried to do that same the fuzzer throws the error: `Custom_post_process fa
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
A container repository for my public web hacks!
Curated list of resources on testing distributed systems
Hello everyone,
I think that the boofuzz documentation is good, but somehow not very useful for beginners.
In my opinion, the quickstart section is too short, leaving new users without any guidance on how to use this framework.
So I would suggest adding a whole section with detailed examples, covering at least the current examples,
I wonder if it was considered to add a rewrite step as a MSBuild target in the NuGet package. This way calling the tool coyote rewrite wouldn't be needed as that would be done automatically once the assembly is generated.
Could possibly be done if a specific property is provided like /p:CoyoteRewrite=true or be an opt-out when Configuration=Debug.
Mining parameters from dark corners of Web Archives
Dictionary collection project such as Pentesing, Fuzzing, Bruteforce and BugBounty. 渗透测试、SRC漏洞挖掘、爆破、Fuzzing等字典收集项目。
A toolset for reverse engineering and fuzzing Protobuf-based apps
Add a description, image, and links to the fuzzing topic page so that developers can more easily learn about it.
To associate your repository with the fuzzing topic, visit your repo's landing page and select "manage topics."