Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming language.
☆49Apr 2, 2026Updated 3 weeks ago
Alternatives and similar repositories for Pex
Users that are interested in Pex are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HatAsm is a powerful assembler and disassembler that provides support for all common architectures.☆18Jan 5, 2026Updated 3 months ago
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆324Apr 2, 2026Updated 3 weeks ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆16Jun 30, 2023Updated 2 years ago
- Clone an Android Virtual Device for easy distribution through the Android SDK Manager.☆16Jul 9, 2012Updated 13 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆244Jul 17, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆549Jul 18, 2024Updated last year
- This repo is a helpful starting point for those interested in exploring the world of Android hacking and bug bounties. The resources ment…☆229Nov 11, 2025Updated 5 months ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Sep 2, 2020Updated 5 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,323Nov 1, 2025Updated 5 months ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆10Oct 1, 2025Updated 6 months ago
- unix-like reverse engineering framework and commandline tools☆10Mar 10, 2023Updated 3 years ago
- A python program to grab Wi-Fi credentials from a windows machine.☆18Feb 28, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Advanced payload generetor and multi handler☆38Dec 20, 2020Updated 5 years ago
- An exploit for Safari 17.4 and lower that enables fingerprinting Safari users using OffscreenCanvas and SharedWorkers even if fingerprint…☆16Sep 1, 2024Updated last year
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆19Feb 8, 2025Updated last year
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 8 years ago
- A free, open-source, macOS Mojave-like dark mode for iOS☆12Mar 7, 2019Updated 7 years ago
- Chat application built in React Native with Firebase, React Navigation, and Gifted Chat☆15Jan 7, 2019Updated 7 years ago
- iDevice Exploit Injector☆14Apr 26, 2011Updated 15 years ago
- ☆28Aug 25, 2022Updated 3 years ago
- Forwards bank SMS messages to an online server, help to automate transaction creation in FireFly-III.☆14May 14, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ✍️ A curated list of CVE PoCs.☆13Jan 24, 2018Updated 8 years ago
- Cache directory with web files (html/js...) to ApplicationCache.db file☆11Dec 27, 2020Updated 5 years ago
- OWASP Droid10 is an opensource handheld system based (android) web application pen testing tool. It can scan for web application vulnera…☆17Jan 23, 2022Updated 4 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆25Jun 14, 2022Updated 3 years ago
- This module captures SQL traffic using MITM techinques, and replace a given statement with a new one.☆13Oct 26, 2018Updated 7 years ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆16Jun 14, 2024Updated last year
- A tool that allows remote computer control. Open source alternative of Teamviewer and Anydesk.☆11Oct 2, 2021Updated 4 years ago
- Example of CVE-2022-46689 aka MacDirtyCow.☆14Mar 1, 2023Updated 3 years ago
- Pay Hub for decentralized web. Bring payment to every website without a payment center.☆10Jun 25, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A verified list of fake ID vendors with links for educational reference.☆20Jan 15, 2024Updated 2 years ago
- In this tutorial, we will learn how to create Ionic 4 Angular CRUD application and implement SQLite Native plugin to store the data in th…☆12Jan 7, 2023Updated 3 years ago
- SimInformation is a cross-platform Xamarin/UWP library that provides a way to access information on your SIM card.☆12Sep 7, 2020Updated 5 years ago
- Activator support library for iOS 11☆16Jan 16, 2019Updated 7 years ago
- Twenty-twenty, bugs aplenty!☆54Jan 10, 2023Updated 3 years ago
- Scripts to recover (accidentally) deleted files from ext3 partitions☆14Aug 16, 2017Updated 8 years ago
- Take control of your Android system with Arch Adventures, bringing the flexibility and customization of Arch Linux to your mobile device!…☆30Dec 5, 2023Updated 2 years ago