# import all of Sulley’s functionality. from sulley import * # this request is for fuzzing: {GET,HEAD,POST,TRACE} /index.html HTTP/1.1 # define a new block named “HTTP BASIC”. s_initialize(“HTTP BASIC”) # define a group primitive listing the various HTTP verbs we wish to fuzz. s_group(“verbs”, values=[“GET”, “HEAD”, “POST”, “TRACE”]) # define a new block named “body” […]
- 
		
Recent Posts
- JSON ContentTypeHandler
 - Mac OS X vulnerability – execution of arbitrary Javascript code without restrictions
 - Snort rules for Petya ransomware
 - HIDDEN COBRA – DDoS Botnet Infrastructure
 - Unauthenticated buffer overflow exploit
 - Python – exploit script
 - Bind mounts
 - Autodafé
 - Sulley request designed to fuzz a Web server
 - General Purpose Fuzzer (GPF)
 
 Tags
Contact
rniko@cryptolab.net
License
