Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.
Switch branches/tags
Nothing to show
Clone or download
Type Name Latest commit message Commit time
Failed to load latest commit information.
images Added image and changes to README Jun 20, 2017
LICENSE Create LICENSE Jun 12, 2017 Changed subprocess read to subprocess communicate to avoid blocking. … Aug 29, 2017 No need for setuid root Aug 29, 2017
test.pcap Added test.pcap Jun 20, 2017

pcrappyfuzzer a very simple mash-up of Scapy + radamsa to extract data from a PCAP file and perform quick 'n dirty fuzzing ad infinitum.

Originally written for a penetration testing engagement, but modified to support the blog post "Fuzzing proprietary protocols with Scapy, radamsa and a handful of PCAPs" published in


  • Julio Cesar Fort - julio at blazeinfosec dot com



This project is licensed under the Apache License - see the LICENSE file for details

Copyright 2016-2017, Blaze Information Security


Thanks to the talented folks of Hackerstrip for the art used in our blog post.

Burning PCAPs