Gfuzz
Gfuzz is a web application fuzzing environment which combines fine-grained taint analysis on the server-side (using CORE Grasp) with grammar-based analysis. This allows to perform fuzzing tests and accurately detect attacks feeding the grammar analyzer with the executed SQL queries (on the server side) together with security taint marks for each query.
Bunny the Fuzzer
A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs.
WSFuzzer
WSFuzzer is a fuzzing penetration testing tool used against HTTP SOAP based web services
Wfuzz
Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforc
Fusil
Fusil the fuzzer is a Python library used to write fuzzing programs. It helps to start process with a prepared environment (limit memory, environment variables, redirect stdout, etc.), start network client or server, and create mangled files
TAOF
Taof is a GUI cross-platform Python generic network protocol fuzzer. It has been designed for minimizing set-up time during fuzzing sessions and it is especially useful for fast testing of proprietary or undocumented protocols.
Peach Fuzzing Platform
Peach is an easy to use, extensible, fuzzing platform. Peach is capable of fuzzing just about anything you can imagine including network based services, RPC, COM/DCOM, SQL Stored Procedures, file formats, etc.
Scanit - Exception Monitor
This utility uses the Windows debugging API to attach to running processes and monitor for exceptions. The idea is to specify the name of an executable and tell EMon to automatically attach to the process when it sees it starts up. When an exception occur
本文转sinojelly51CTO博客,原文链接:http://blog.51cto.com/pnig0s1992/303116,如需转载请自行联系原作者