A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Mar 7, 2022
{{ message }}
A collection of various awesome lists for hackers, pentesters and security researchers
Web path scanner
OSS-Fuzz - continuous fuzzing for open source software.
Hypothesis is a powerful, flexible, and easy to use library for property-based testing.
the champagne of beta embedded databases
Scalable fuzzing infrastructure.
Web Pentesting Fuzz 字典,一个就够了。
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
syzkaller is an unsupervised coverage-guided kernel fuzzer
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Property based testing framework for JavaScript (like QuickCheck) written in TypeScript
A high performance offensive security tool for reconnaissance and vulnerability scanning
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Forge
No response
No response
No response
(this didn't really feel like a bug or a feature request, so just put it as a bug)
The [foundry implementation](https://
Curated list of resources on testing distributed systems
A container repository for my public web hacks!
Hello everyone,
I think that the boofuzz documentation is good, but somehow not very useful for beginners.
In my opinion, the quickstart section is too short, leaving new users without any guidance on how to use this framework.
So I would suggest adding a whole section with detailed examples, covering at least the current examples,
Web Fuzzing Box - Web 模糊测试字典与一些Payloads,主要包含:弱口令暴力破解、目录以及文件枚举、Web漏洞...字典运用于实战案例:https://gh0st.cn/archives/2019-11-11/1
I wonder if it was considered to add a rewrite step as a MSBuild target in the NuGet package. This way calling the tool coyote rewrite wouldn't be needed as that would be done automatically once the assembly is generated.
Could possibly be done if a specific property is provided like /p:CoyoteRewrite=true or be an opt-out when Configuration=Debug.
An step by step fuzzing tutorial. A GitHub Security Lab initiative
Add a description, image, and links to the fuzzing topic page so that developers can more easily learn about it.
To associate your repository with the fuzzing topic, visit your repo's landing page and select "manage topics."
When the computer is suspended during a fuzzing session, the time spent in suspended state is counted as a "run time" on a statistics screen. In case fuzzing was running for several hours and then the computer was suspended for several more hours, on one hand I would prefer not restarting the session, on the other hand, now it may be harder to tell how well a harness performs (corpus count vs. run