Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming language.
☆49Apr 2, 2026Updated last month
Alternatives and similar repositories for Pex
Users that are interested in Pex are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆324Apr 2, 2026Updated last month
- Powerful advanced web platform for C2 managing and automated penetration testing.☆16Jun 30, 2023Updated 2 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆17Dec 26, 2021Updated 4 years ago
- Clone an Android Virtual Device for easy distribution through the Android SDK Manager.☆16Jul 9, 2012Updated 13 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆244Jul 17, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆548Jul 18, 2024Updated last year
- Wireshark dissector for the Android Debug Bridge (ADB) protocol☆15Apr 22, 2013Updated 13 years ago
- This repo is a helpful starting point for those interested in exploring the world of Android hacking and bug bounties. The resources ment…☆229Nov 11, 2025Updated 6 months ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive…☆699Sep 20, 2024Updated last year
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆53Oct 28, 2025Updated 6 months ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆22Oct 13, 2020Updated 5 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,337Nov 1, 2025Updated 6 months ago
- Decentralized payment system☆15Feb 9, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- unix-like reverse engineering framework and commandline tools☆10Mar 10, 2023Updated 3 years ago
- An exploit for Safari 17.4 and lower that enables fingerprinting Safari users using OffscreenCanvas and SharedWorkers even if fingerprint…☆16Sep 1, 2024Updated last year
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- A Windows 10 login phishing page for your red team exercises☆15Apr 25, 2021Updated 5 years ago
- Go (golang) client library for the Dropbox core and Datastore API with support for uploading and downloading encrypted files.☆12May 22, 2017Updated 8 years ago
- Food delivery app, made with Ionic 4.x. It uses Firebase Realtime Database, Firebase Authentication and Google Maps API.☆10Apr 22, 2019Updated 7 years ago
- iDevice Exploit Injector☆14Apr 26, 2011Updated 15 years ago
- ☆28Aug 25, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Forwards bank SMS messages to an online server, help to automate transaction creation in FireFly-III.☆14May 14, 2024Updated 2 years ago
- Virus for windows 100% FUD & bypass any AV☆25Oct 14, 2025Updated 7 months ago
- ✍️ A curated list of CVE PoCs.☆13Jan 24, 2018Updated 8 years ago
- My Tampermonkey scripts☆19Apr 9, 2026Updated last month
- the example that goes with the HID Keyboard video☆12Jun 15, 2022Updated 3 years ago
- ☆11Aug 20, 2025Updated 8 months ago
- Trustcache injector for iOS 11.3-11.4☆11Jul 26, 2018Updated 7 years ago
- ☆17Jan 14, 2022Updated 4 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆25Jun 14, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- M3u8 resolver for common sources found on vidsrc.me☆21Apr 11, 2024Updated 2 years ago
- Xiao is a Discord bot coded in JavaScript with discord.js using the Commando command framework. With over 500 commands, she is one of the…☆11Aug 26, 2022Updated 3 years ago
- REST API client to consume w3af☆17May 22, 2023Updated 2 years ago
- ☆15Feb 27, 2021Updated 5 years ago
- Reinforcement Learning based trading bot (Open AI Gym, Stable Baselines)☆10Mar 24, 2023Updated 3 years ago
- ☆11Mar 26, 2024Updated 2 years ago
- Payloads and Lists☆23Feb 12, 2020Updated 6 years ago