Customizable TCP fuzzing tool to test for remote buffer overflows.
Project description
fuzza
Customizable TCP fuzzing tool to test for remote buffer overflows.
Installation
pip install fuzza
Usage
$ fuzza --help
usage: fuzza [-c char] [-p str] [-s str] [-i int] [-r int] [-d float] host port
[-h] [-v]
Customizable TCP fuzzing tool to test for remote buffer overflows.
positional arguments:
host address to connect to.
port port to connect to.
optional arguments:
-h, --help show this help message and exit
-v, --version Show version information,
-c char, --char char Buffer character to send as payload. Default: "A"
-p str, --prefix str Prefix string to prepend to buffer. Empty by default.
-s str, --suffix str Suffix string to append to buffer. Empty by default.
-i int, --init-multi int Initial multiplier to concat buffer string with
x*char. Default: 100
-r int, --round-multi int Round multiplier to concat buffer string with x*char
every round. Default: 100
-d float, --delay float Delay in seconds between each round. Default: 1.0
License
Copyright (c) 2020 cytopia
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
fuzza-0.1.0.tar.gz
(3.3 kB
view hashes)
Built Distribution
Close
Hashes for fuzza-0.1.0-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 0311ef7b72bb05841cbc4435e7ad3bb59c889d4580d8ea15acec9ca689078a5f |
|
MD5 | 9b9e0f2660f7f884fef5f82ddfc0b2d9 |
|
BLAKE2b-256 | 4178194e77ab75c98b2067036b1b51cf088214024be98cb369ecd1ba473560b6 |