Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming language.
☆50Apr 2, 2026Updated last week
Alternatives and similar repositories for Pex
Users that are interested in Pex are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HatAsm is a powerful assembler and disassembler that provides support for all common architectures.☆18Jan 5, 2026Updated 3 months ago
- Pwny is an implementation of an advanced payload written in pure C and designed for portability and extensibility.☆91Apr 2, 2026Updated last week
- Powerful advanced web platform for C2 managing and automated penetration testing.☆16Jun 30, 2023Updated 2 years ago
- Clone an Android Virtual Device for easy distribution through the Android SDK Manager.☆16Jul 9, 2012Updated 13 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆244Jul 17, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆543Jul 18, 2024Updated last year
- This repo is a helpful starting point for those interested in exploring the world of Android hacking and bug bounties. The resources ment…☆228Nov 11, 2025Updated 4 months ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive…☆681Sep 20, 2024Updated last year
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,311Nov 1, 2025Updated 5 months ago
- unix-like reverse engineering framework and commandline tools☆10Mar 10, 2023Updated 3 years ago
- Advanced payload generetor and multi handler☆37Dec 20, 2020Updated 5 years ago
- A python program to grab Wi-Fi credentials from a windows machine.☆18Feb 28, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- SMTP Open Relay Exploitation☆16Nov 23, 2020Updated 5 years ago
- An exploit for Safari 17.4 and lower that enables fingerprinting Safari users using OffscreenCanvas and SharedWorkers even if fingerprint…☆15Sep 1, 2024Updated last year
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆19Feb 8, 2025Updated last year
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 8 years ago
- A free, open-source, macOS Mojave-like dark mode for iOS☆12Mar 7, 2019Updated 7 years ago
- Some Batch scripts that can cause temporary and permanent disruption of service. ( just for fun)☆13Jul 30, 2025Updated 8 months ago
- A Windows 10 login phishing page for your red team exercises☆15Apr 25, 2021Updated 4 years ago
- Chat application built in React Native with Firebase, React Navigation, and Gifted Chat☆15Jan 7, 2019Updated 7 years ago
- ☆28Aug 25, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Forwards bank SMS messages to an online server, help to automate transaction creation in FireFly-III.☆14May 14, 2024Updated last year
- CVE-2022-30780 - lighttpd remote denial of service☆17Mar 16, 2024Updated 2 years ago
- Virus for windows 100% FUD & bypass any AV☆24Oct 14, 2025Updated 5 months ago
- My Tampermonkey scripts☆18Feb 26, 2026Updated last month
- Trustcache injector for iOS 11.3-11.4☆10Jul 26, 2018Updated 7 years ago
- ☆13Jun 15, 2018Updated 7 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 4 years ago
- This module captures SQL traffic using MITM techinques, and replace a given statement with a new one.☆12Oct 26, 2018Updated 7 years ago
- ☆15Feb 27, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆16Jun 14, 2024Updated last year
- ☆11Mar 26, 2024Updated 2 years ago
- A tool that allows remote computer control. Open source alternative of Teamviewer and Anydesk.☆11Oct 2, 2021Updated 4 years ago
- Payloads and Lists☆23Feb 12, 2020Updated 6 years ago
- ASCII-ART to make someone smile ♡☆11Jul 3, 2022Updated 3 years ago
- In this tutorial, we will learn how to create Ionic 4 Angular CRUD application and implement SQLite Native plugin to store the data in th…☆12Jan 7, 2023Updated 3 years ago
- A verified list of fake ID vendors with links for educational reference.☆20Jan 15, 2024Updated 2 years ago