Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming language.
☆49Oct 13, 2024Updated last year
Alternatives and similar repositories for Pex
Users that are interested in Pex are comparing it to the libraries listed below
Sorting:
- Pwny is an implementation of an advanced payload written in pure C and designed for portability and extensibility.☆93Dec 2, 2024Updated last year
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆321Dec 1, 2024Updated last year
- Powerful advanced web platform for C2 managing and automated penetration testing.☆15Jun 30, 2023Updated 2 years ago
- C library that is intended for providing methods for executing and injecting code.☆17Aug 14, 2024Updated last year
- Clone an Android Virtual Device for easy distribution through the Android SDK Manager.☆16Jul 9, 2012Updated 13 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆241Jul 17, 2024Updated last year
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆540Jul 18, 2024Updated last year
- Wireshark dissector for the Android Debug Bridge (ADB) protocol☆14Apr 22, 2013Updated 12 years ago
- This repo is a helpful starting point for those interested in exploring the world of Android hacking and bug bounties. The resources ment…☆228Nov 11, 2025Updated 4 months ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Sep 2, 2020Updated 5 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- Penguin Xposed Framework☆10Apr 15, 2019Updated 6 years ago
- SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive…☆676Sep 20, 2024Updated last year
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆52Oct 28, 2025Updated 4 months ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,298Nov 1, 2025Updated 4 months ago
- Decentralized payment system☆15Feb 9, 2018Updated 8 years ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆10Oct 1, 2025Updated 5 months ago
- unix-like reverse engineering framework and commandline tools☆10Mar 10, 2023Updated 3 years ago
- 🔮 Predicting NBA games using statistics (65% accuracy so far)☆10Mar 7, 2021Updated 5 years ago
- SMTP Open Relay Exploitation☆16Nov 23, 2020Updated 5 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 8 years ago
- A free, open-source, macOS Mojave-like dark mode for iOS☆12Mar 7, 2019Updated 7 years ago
- Chat application built in React Native with Firebase, React Navigation, and Gifted Chat☆15Jan 7, 2019Updated 7 years ago
- iDevice Exploit Injector☆13Apr 26, 2011Updated 14 years ago
- CVE-2022-30780 - lighttpd remote denial of service☆17Mar 16, 2024Updated 2 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- Virus for windows 100% FUD & bypass any AV☆24Oct 14, 2025Updated 5 months ago
- ✍️ A curated list of CVE PoCs.☆13Jan 24, 2018Updated 8 years ago
- Cache directory with web files (html/js...) to ApplicationCache.db file☆11Dec 27, 2020Updated 5 years ago
- My Tampermonkey scripts☆18Feb 26, 2026Updated 3 weeks ago
- OWASP Droid10 is an opensource handheld system based (android) web application pen testing tool. It can scan for web application vulnera…☆17Jan 23, 2022Updated 4 years ago
- Trustcache injector for iOS 11.3-11.4☆10Jul 26, 2018Updated 7 years ago
- ☆13Jun 15, 2018Updated 7 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- A tool that allows remote computer control. Open source alternative of Teamviewer and Anydesk.☆10Oct 2, 2021Updated 4 years ago
- M3u8 resolver for common sources found on vidsrc.me☆21Apr 11, 2024Updated last year