Gfuzz

Gfuzz is a web application fuzzing environment which combines fine-grained taint analysis on the server-side (using CORE Grasp) with grammar-based analysis. This allows to perform fuzzing tests and accurately detect attacks feeding the grammar analyzer with the executed SQL queries (on the server side) together with security taint marks for each query. 

Bunny the Fuzzer

A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. 

WSFuzzer

WSFuzzer is a fuzzing penetration testing tool used against HTTP SOAP based web services 

Wfuzz

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforc 

Fusil

Fusil the fuzzer is a Python library used to write fuzzing programs. It helps to start process with a prepared environment (limit memory, environment variables, redirect stdout, etc.), start network client or server, and create mangled files 

TAOF

Taof is a GUI cross-platform Python generic network protocol fuzzer. It has been designed for minimizing set-up time during fuzzing sessions and it is especially useful for fast testing of proprietary or undocumented protocols. 

Peach Fuzzing Platform

Peach is an easy to use, extensible, fuzzing platform. Peach is capable of fuzzing just about anything you can imagine including network based services, RPC, COM/DCOM, SQL Stored Procedures, file formats, etc. 

Scanit - Exception Monitor

This utility uses the Windows debugging API to attach to running processes and monitor for exceptions. The idea is to specify the name of an executable and tell EMon to automatically attach to the process when it sees it starts up. When an exception occur