what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 150 of 191 RSS Feed

Fuzzer Files

powerfuzzer_v1_beta.zip
Posted Jul 25, 2008
Authored by Marcin Kozlowski | Site powerfuzzer.sourceforge.net

Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (including cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer) and information gathered from numerous security resources and websites. It is capable of spidering a website and identifying inputs.

tags | web, fuzzer
SHA-256 | 4ee9ca809287166d059f03478f84ab9ae3b6ab083adaee34d3b2091de62e924b
fusil-0.9.tar.gz
Posted Jul 10, 2008
Authored by Victor Stinner | Site fusil.hachoir.org

Fusil the fuzzer is a Python library used to write fuzzing programs. It helps to start process with a prepared environment (limit memory, environment variables, redirect stdout, etc.), start network client or server, and create mangled files. Fusil has many probes to detect program crash: watch process exit code, watch process stdout and syslog for text patterns (eg. "segmentation fault"), watch session duration, watch cpu usage (process and system load), etc.

tags | python, library, fuzzer
SHA-256 | 9f7c129e9742196110db2d38a69c5ab53da1ed4bd63f1ab85e877269ac4828fc
tmin-0.04.tar.gz
Posted Jun 19, 2008
Authored by Michal Zalewski | Site code.google.com

tmin is a quick and simple tool to minimize the size and syntax of complex test cases in automated security testing. It is meant specifically for dealing with unknown or complex data formats (without the need to tokenize and re-serialize testcases), and for easy integration with UI testing harnesses.

tags | fuzzer
SHA-256 | f80bf14e4e0e2aef70ffee1065caee30c845ca9dae1448701ff20d7f6853e261
zzuf-0.12.tar.gz
Posted Jun 13, 2008
Authored by Sam Hocevar | Site sam.zoy.org

zzuf is a transparent application input fuzzer. It works by intercepting file operations and changing random bits in the program's input. zzuf's behavior is deterministic, making it easy to reproduce bugs.

Changes: Finished the libzzuf manual page, a crash, and some other bugs.
tags | fuzzer
SHA-256 | 0a89fdb6912d4dd68ac88c54951e87738294d13562e0d57662fb90974b947710
bunny-0.93.tgz
Posted May 22, 2008
Authored by Michal Zalewski | Site code.google.com

Bunny the Fuzzer - A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. Uses compiler-level integration to seamlessly inject precise and reliable instrumentation hooks into the traced program. These hooks enable the fuzzer to receive real-time feedback on changes to the function call path, call parameters, and return values in response to variations in input data. This architecture makes it possible to significantly improve the coverage of the testing process without a noticeable performance impact usually associated with other attempts to peek into run-time internals.

Changes: Bug fix release.
tags | protocol, fuzzer
SHA-256 | 30c7765b960b131246bfe8c25b79d20eae49f282dd0ac3b7e1e293233a446f99
zzuf-0.11.tar.gz
Posted May 19, 2008
Authored by Sam Hocevar | Site sam.zoy.org

zzuf is a transparent application input fuzzer. It works by intercepting file operations and changing random bits in the program's input. zzuf's behavior is deterministic, making it easy to reproduce bugs.

Changes: Minor memory and speed optimizations.
tags | fuzzer
SHA-256 | 914a543d2230a7b8ce134d8bbe1c8ae18cec7be3c49361770ac04eda12cf3e05
d3sqlfuzz.py.txt
Posted May 19, 2008
Authored by d3hydr8 | Site darkc0de.com

SQL fuzzing utility written in Python.

tags | python, fuzzer
SHA-256 | 051c055fe00407919e7c1c2ffd3567e5a02d5ed2df101486511d5995ffe39ed8
sqlfuzzer.py.txt
Posted May 15, 2008
Authored by Beenu Arora

SQL Injector version 1.0 is a fuzzing utility written in Python.

tags | python, fuzzer
SHA-256 | 540c59b543ffe0c33b344577bedcbe77ec179eb7b6441061ffb9c703c0bede59
xsschecker.py.txt
Posted May 15, 2008
Authored by Beenu Arora

Cross site scripting fuzzing utility written in Python.

tags | xss, python, fuzzer
SHA-256 | d6635e858fcf89ce62f89cf87e20a31f8c853800d25e2d5039fa428808132e90
tmin-0.03.tar.gz
Posted Apr 28, 2008
Authored by Michal Zalewski | Site code.google.com

tmin is a quick and simple tool to minimize the size and syntax of complex test cases in automated security testing. It is meant specifically for dealing with unknown or complex data formats (without the need to tokenize and re-serialize testcases), and for easy integration with UI testing harnesses.

tags | fuzzer
SHA-256 | 6fa417edb887bc2a9b30f10caf309c076293186b24d00cd9af098a7243ff02a0
syslog-fuzzer.txt
Posted Apr 9, 2008
Authored by Jaime Blasco | Site aitsec.com

Syslog Fuzzer is a small perl script tool that is useful for testing some attack vectors against syslog servers. It has support for buffer/integer overflows and format string vulnerabilities.

tags | overflow, perl, vulnerability, fuzzer
SHA-256 | fb34a3d4e18d1e8af3658c6272e7e8976431669d015724f634b37da32a293743
wfuzz-1.4.tar.gz
Posted Jan 25, 2008
Authored by Christian Martorella, Carlos del ojo | Site edge-security.com

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, files), bruteforce HEADERS, GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/ Password), Fuzzing, etc.

tags | web, fuzzer
SHA-256 | fc1a73ded9af26968df62c865343f4ddfe5300ca020cd32a41ab9f0bb2577adb
pgmfuzz.c
Posted Dec 12, 2007
Authored by Varun Uppal, Andy Davis - IRMPLC | Site irmplc.com

PGMfuzz is a fuzzer written for identifying vulnerabilities in PGM option parsing implementations.

tags | vulnerability, fuzzer
SHA-256 | b74310aa941f94bcbfee075e203ba145d732c8d357727cc806d9623b94be7d22
bunny-0.92.tgz
Posted Nov 8, 2007
Authored by Michal Zalewski | Site code.google.com

Bunny the Fuzzer - A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. Uses compiler-level integration to seamlessly inject precise and reliable instrumentation hooks into the traced program. These hooks enable the fuzzer to receive real-time feedback on changes to the function call path, call parameters, and return values in response to variations in input data. This architecture makes it possible to significantly improve the coverage of the testing process without a noticeable performance impact usually associated with other attempts to peek into run-time internals.

Changes: IPC handling bug fix.
tags | protocol, fuzzer
SHA-256 | dae9be447ea202eb4d5eeb0cba317136fe15861630c1562730ff011f8ecb33c7
bunny-0.91.tgz
Posted Nov 7, 2007
Authored by Michal Zalewski | Site code.google.com

Bunny the Fuzzer - A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. Uses compiler-level integration to seamlessly inject precise and reliable instrumentation hooks into the traced program. These hooks enable the fuzzer to receive real-time feedback on changes to the function call path, call parameters, and return values in response to variations in input data. This architecture makes it possible to significantly improve the coverage of the testing process without a noticeable performance impact usually associated with other attempts to peek into run-time internals.

Changes: Various bug fixes.
tags | protocol, fuzzer
SHA-256 | ebfb03563564202d26c9314f19b2cbbdf98cdb2c16d21f6628ccf680af7d3db6
zzuf-0.10.tar.gz
Posted Nov 3, 2007
Authored by Sam Hocevar | Site sam.zoy.org

zzuf is a transparent application input fuzzer. It works by intercepting file operations and changing random bits in the program's input. zzuf's behavior is deterministic, making it easy to reproduce bugs.

Changes: Various code and documentation updates.
tags | fuzzer
SHA-256 | a5fa82e49c01721f0ae339345780c55d1ae9e42ed6909901a1c688800e5b834c
bunny-0.9.tgz
Posted Oct 31, 2007
Authored by Michal Zalewski | Site code.google.com

Bunny the Fuzzer - A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. Uses compiler-level integration to seamlessly inject precise and reliable instrumentation hooks into the traced program. These hooks enable the fuzzer to receive real-time feedback on changes to the function call path, call parameters, and return values in response to variations in input data. This architecture makes it possible to significantly improve the coverage of the testing process without a noticeable performance impact usually associated with other attempts to peek into run-time internals.

tags | protocol, fuzzer
SHA-256 | 7316d0f0a285a94b48f522cda8e5a4963a67a6b63cbe7e8aaa2dd7ed46a4b9ef
WAFUTFF.pdf
Posted Sep 5, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

Whitepaper entitled "Writing a fuzzer using the Fuzzled framework". The paper includes some of the techniques used to dismantle protocols including documentation, observation and static analysis.

tags | paper, protocol, fuzzer
SHA-256 | 85eff0372eb6b927c7f66e8380f04f54c2152fb1202fd191238c82796096ff34
PSA3.zip
Posted Jul 28, 2007
Authored by Ironfist

PHP Source Auditor III (or PSA3) was created in order to quickly find vulnerabilities in PHP source code. Written in Perl.

tags | perl, php, vulnerability, fuzzer
SHA-256 | 787110a34b85754752472a108a0e65147bfdd6deda7c812bfd88705c49a5740a
EFS-PaiMei.zip
Posted Jul 13, 2007
Authored by Jared DeMott | Site vdalabs.com

The Evolutionary Fuzzing System (EFS) is a fuzzer that attempts to eliminate traditional fuzzer techniques of building a new fuzzer for each protocol by dynamically learning a protocol using code coverage and other feedback mechanisms.

tags | protocol, fuzzer
SHA-256 | 25c9e9a281636d9be7f0216bfa0eb37beca0ff7dc82ae2e3f00832e4c0cb964d
GPF.tar.bz2
Posted Jul 13, 2007
Authored by Jared DeMott | Site vdalabs.com

GPF is a fuzzer that provides developers, security researchers, and quality assurance professionals the capability to quickly search for bugs/vulnerabilities in the exposed interface of networked applications. GPF uses captured packet sessions (from libpcap) to construct a protocol description from real traffic. Users can then configure various types of injected faults, manually modify the capture file, and define custom functions to deal with dynamic data.

tags | vulnerability, protocol, fuzzer
SHA-256 | 9597f83a0a3b35e591f9e0d360e8589e6157a42ff347d071a12df55d00355a2d
zzuf-0.9.tar.gz
Posted Jul 11, 2007
Authored by Sam Hocevar | Site sam.zoy.org

zzuf is a transparent application input fuzzer. It works by intercepting file operations and changing random bits in the program's input. zzuf's behavior is deterministic, making it easy to reproduce bugs.

tags | fuzzer
SHA-256 | 7df5232b8c6004828bcde2ac32d9d75b2b39d4f4bd4c9c56582f739aa62efa58
pff-BETA.tar.gz
Posted Jul 7, 2007
Authored by calcite | Site setec.org

pff (Php Fuzzing Framework) is a tiny tool that was created with the intention of discovering security and general bugs within Php functions.

tags | php, fuzzer
SHA-256 | 4d0f87948f015600b4b1c890ebfef7fe135aa49b4dad26119a4e5a0318cbf177
untidy-beta2.tgz
Posted Jun 7, 2007
Authored by Andres Riancho | Site untidy.sourceforge.net

untidy is general purpose XML Fuzzer. It takes a string representation of a XML as input and generates a set of modified, potentially invalid, XMLs based on the input. It's released under GPL v2 and written in python.

tags | python, fuzzer
SHA-256 | cb9f89dfdf1cce6e76b2946659b685492339efaff809146b7d036304fed2def0
fuzzman.tar.gz
Posted Apr 19, 2007
Authored by E. Kellinis | Site cipher.org.uk

FuzzMan is a simple man page fuzzer that is quite powerful.

tags | fuzzer
SHA-256 | b41eb2bbaca1c7754894834de2761da65eb830c1f3a61c8c0c2d0798df220f24
Page 6 of 8
Back45678Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close