what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 140 RSS Feed

Files

rshatter.txt
Posted Dec 1, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

RSHatter is a rsh protocol fuzzing utility.

tags | protocol, fuzzer
SHA-256 | cd5317d98c22f76c74af147ff8128cda02e43c4f02d0aeec39d30e96a104c33e
tagfuzz.txt
Posted Nov 25, 2008
Authored by r0ut3r

TagFuzzer is a fuzzing utility that edits tag information for a supplied file. Supports MP3, M4A, M4P, MP4, M4B, 3GP, OGG, and FLAC formats.

tags | fuzzer
SHA-256 | 6ea8345c7e60081071fe0e6685179fd102ae6f0146579fee5e456e407fd59f99
mptrey.tar.gz
Posted Nov 14, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

mpTREY is a MP3 fuzzing utility that manipulates tags. Written in Perl.

tags | perl, fuzzer
SHA-256 | 3f272c23c44352dd75429216312ed372076351d35fa4762a4869fd1da89d050d
pdf-fuzzer.txt
Posted Nov 5, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

pdfUZZ is a PDF fuzzing utility written in Perl.

tags | perl, fuzzer
SHA-256 | 99433705cbedf57206587795bf5e5201e013f3738ca7ea8ae2622400592185ab
tftpfuzz.txt
Posted Oct 30, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

TFTP daemon fuzzer that uses Net::TFTP.

tags | fuzzer
SHA-256 | f0bb5b52d7d08ec8d250d4dc352452c02c79c428856b9235545fcf7730463f97
voiper-0.07.tar.gz
Posted Oct 28, 2008
Authored by nnp | Site voiper.sourceforge.net

VoIPER is a VoIP security testing toolkit incorporating several VoIP fuzzers and auxiliary tools to assist the auditor. It can currently generate over 200,000 SIP tests and H.323/IAX modules are in development.

Changes: Added a bundle of new fuzzers. Rewrote the entire SIP backend. Added a 'voiper.config' file.
tags | fuzzer
SHA-256 | 61584b71e6024bab0481eed3fcbb25f14093e26c73b0f33995d9a57693310ece
sshfuzz.txt
Posted Oct 27, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

sshfuzz is a SSH Fuzzing utility written in Perl that uses Net::SSH2.

tags | perl, fuzzer
SHA-256 | c187ed921afa0866b2c9f7c49b9b098c6164bf30a9dafdc234149a34126d74a8
Peach-2.2-src.zip
Posted Oct 27, 2008
Authored by Michael Eddington | Site peachfuzzer.com

Peach is an easily extended fuzzing platform that can fuzz just about anything from file parsers and network protocols to COM objects and SQL stored procedures. Python source version.

Changes: Updated and new mutators. Speed improvements. Various other fixes and improvements.
tags | protocol, python, fuzzer
SHA-256 | ec5a0d5efcdea1e906c416d729f882b54cf8b1648ef8e42fd997fb6879e5b20b
mySQLFUZZer.tar.gz
Posted Oct 22, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Quick little MySQL fuzzing utility that creates sockets and fuzzers on the fly.

tags | fuzzer
SHA-256 | 15405e4927cb4b5b834139904c6fa76a7c7a2d33cfddb4d8878f3376b025779e
dirTraversal.txt
Posted Oct 8, 2008
Authored by Luca Carettoni | Site ikkisoft.com

This is a list of fuzzing vectors used in order to trigger directory traversal vulnerabilities. It is quite a huge list composed using different encodings and bizarre attack patterns reported in several vulnerability advisories.

tags | vulnerability, fuzzer
SHA-256 | 4ba540799aa51a24dc790a72c68a21a526b853367d539adee6941a805954e2e4
zfz20BETA.tar.gz
Posted Oct 1, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

ZfZ stands for Zeroday fuZzer. ZfZ is a network fuzzer that supports many protocols and can do generic fuzzing as well. It is trivial to add protocols to fuzz, just copy and modify the protocols already implemented.

tags | protocol, fuzzer
SHA-256 | ac192433c3e5acdbbe6c3311cba765940f354fc8bbb6a90f2e29f34e2b6cae95
voiper-0.06.tar.gz
Posted Aug 20, 2008
Authored by nnp | Site voiper.sourceforge.net

VoIPER is a VoIP security testing toolkit incorporating several VoIP fuzzers and auxiliary tools to assist the auditor. It can currently generate over 200,000 SIP tests and H.323/IAX modules are in development.

tags | fuzzer
SHA-256 | 395730c606716956bfb37848a1a3d0f336a82fb23b48d41b02b0a76641209299
powerfuzzer_v1_beta.zip
Posted Jul 25, 2008
Authored by Marcin Kozlowski | Site powerfuzzer.sourceforge.net

Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (including cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer) and information gathered from numerous security resources and websites. It is capable of spidering a website and identifying inputs.

tags | web, fuzzer
SHA-256 | 4ee9ca809287166d059f03478f84ab9ae3b6ab083adaee34d3b2091de62e924b
tmin-0.04.tar.gz
Posted Jun 19, 2008
Authored by Michal Zalewski | Site code.google.com

tmin is a quick and simple tool to minimize the size and syntax of complex test cases in automated security testing. It is meant specifically for dealing with unknown or complex data formats (without the need to tokenize and re-serialize testcases), and for easy integration with UI testing harnesses.

tags | fuzzer
SHA-256 | f80bf14e4e0e2aef70ffee1065caee30c845ca9dae1448701ff20d7f6853e261
zzuf-0.12.tar.gz
Posted Jun 13, 2008
Authored by Sam Hocevar | Site sam.zoy.org

zzuf is a transparent application input fuzzer. It works by intercepting file operations and changing random bits in the program's input. zzuf's behavior is deterministic, making it easy to reproduce bugs.

Changes: Finished the libzzuf manual page, a crash, and some other bugs.
tags | fuzzer
SHA-256 | 0a89fdb6912d4dd68ac88c54951e87738294d13562e0d57662fb90974b947710
bunny-0.93.tgz
Posted May 22, 2008
Authored by Michal Zalewski | Site code.google.com

Bunny the Fuzzer - A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. Uses compiler-level integration to seamlessly inject precise and reliable instrumentation hooks into the traced program. These hooks enable the fuzzer to receive real-time feedback on changes to the function call path, call parameters, and return values in response to variations in input data. This architecture makes it possible to significantly improve the coverage of the testing process without a noticeable performance impact usually associated with other attempts to peek into run-time internals.

Changes: Bug fix release.
tags | protocol, fuzzer
SHA-256 | 30c7765b960b131246bfe8c25b79d20eae49f282dd0ac3b7e1e293233a446f99
zzuf-0.11.tar.gz
Posted May 19, 2008
Authored by Sam Hocevar | Site sam.zoy.org

zzuf is a transparent application input fuzzer. It works by intercepting file operations and changing random bits in the program's input. zzuf's behavior is deterministic, making it easy to reproduce bugs.

Changes: Minor memory and speed optimizations.
tags | fuzzer
SHA-256 | 914a543d2230a7b8ce134d8bbe1c8ae18cec7be3c49361770ac04eda12cf3e05
d3sqlfuzz.py.txt
Posted May 19, 2008
Authored by d3hydr8 | Site darkc0de.com

SQL fuzzing utility written in Python.

tags | python, fuzzer
SHA-256 | 051c055fe00407919e7c1c2ffd3567e5a02d5ed2df101486511d5995ffe39ed8
sqlfuzzer.py.txt
Posted May 15, 2008
Authored by Beenu Arora

SQL Injector version 1.0 is a fuzzing utility written in Python.

tags | python, fuzzer
SHA-256 | 540c59b543ffe0c33b344577bedcbe77ec179eb7b6441061ffb9c703c0bede59
xsschecker.py.txt
Posted May 15, 2008
Authored by Beenu Arora

Cross site scripting fuzzing utility written in Python.

tags | xss, python, fuzzer
SHA-256 | d6635e858fcf89ce62f89cf87e20a31f8c853800d25e2d5039fa428808132e90
tmin-0.03.tar.gz
Posted Apr 28, 2008
Authored by Michal Zalewski | Site code.google.com

tmin is a quick and simple tool to minimize the size and syntax of complex test cases in automated security testing. It is meant specifically for dealing with unknown or complex data formats (without the need to tokenize and re-serialize testcases), and for easy integration with UI testing harnesses.

tags | fuzzer
SHA-256 | 6fa417edb887bc2a9b30f10caf309c076293186b24d00cd9af098a7243ff02a0
syslog-fuzzer.txt
Posted Apr 9, 2008
Authored by Jaime Blasco | Site aitsec.com

Syslog Fuzzer is a small perl script tool that is useful for testing some attack vectors against syslog servers. It has support for buffer/integer overflows and format string vulnerabilities.

tags | overflow, perl, vulnerability, fuzzer
SHA-256 | fb34a3d4e18d1e8af3658c6272e7e8976431669d015724f634b37da32a293743
wfuzz-1.4.tar.gz
Posted Jan 25, 2008
Authored by Christian Martorella, Carlos del ojo | Site edge-security.com

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, files), bruteforce HEADERS, GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/ Password), Fuzzing, etc.

tags | web, fuzzer
SHA-256 | fc1a73ded9af26968df62c865343f4ddfe5300ca020cd32a41ab9f0bb2577adb
pgmfuzz.c
Posted Dec 12, 2007
Authored by Varun Uppal, Andy Davis - IRMPLC | Site irmplc.com

PGMfuzz is a fuzzer written for identifying vulnerabilities in PGM option parsing implementations.

tags | vulnerability, fuzzer
SHA-256 | b74310aa941f94bcbfee075e203ba145d732c8d357727cc806d9623b94be7d22
bunny-0.92.tgz
Posted Nov 8, 2007
Authored by Michal Zalewski | Site code.google.com

Bunny the Fuzzer - A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. Uses compiler-level integration to seamlessly inject precise and reliable instrumentation hooks into the traced program. These hooks enable the fuzzer to receive real-time feedback on changes to the function call path, call parameters, and return values in response to variations in input data. This architecture makes it possible to significantly improve the coverage of the testing process without a noticeable performance impact usually associated with other attempts to peek into run-time internals.

Changes: IPC handling bug fix.
tags | protocol, fuzzer
SHA-256 | dae9be447ea202eb4d5eeb0cba317136fe15861630c1562730ff011f8ecb33c7
Page 4 of 6
Back23456Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Nation-State Hackers Exploit Cisco Firewall Zero Days To Backdoor Government Networks
Posted Apr 25, 2024

tags | headline, hacker, government, cyberwar, cisco, backdoor
FTC Sending $5.6 Million To Ring Customers Over Security Failures
Posted Apr 25, 2024

tags | headline, government, privacy, usa, amazon, flaw
Palo Alto Networks Shares Remediation Advice
Posted Apr 25, 2024

tags | headline, flaw
Russia, Iran Pose Most Aggressive Threat To 2024 Election
Posted Apr 25, 2024

tags | headline, government, usa, russia, fraud, cyberwar, iran
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
North Korean Hackers Hijack Antivirus Updates For Malware Delivery
Posted Apr 24, 2024

tags | headline, hacker, government, malware, flaw, cyberwar, military, north korea
CISA Warns Of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation
Posted Apr 24, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar
US Charges Iranians With Cyber Snooping On Government, Companies
Posted Apr 24, 2024

tags | headline, hacker, government, privacy, usa, cyberwar, spyware, iran
TensorFlow AI Models At Risk Due To Keras API Flaw
Posted Apr 24, 2024

tags | headline, flaw
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close