Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming language.
☆49Oct 13, 2024Updated last year
Alternatives and similar repositories for Pex
Users that are interested in Pex are comparing it to the libraries listed below
Sorting:
- HatAsm is a powerful assembler and disassembler that provides support for all common architectures.☆18Jan 5, 2026Updated last month
- Powerful advanced web platform for C2 managing and automated penetration testing.☆15Jun 30, 2023Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Sep 2, 2020Updated 5 years ago
- Clone an Android Virtual Device for easy distribution through the Android SDK Manager.☆16Jul 9, 2012Updated 13 years ago
- ☆11Mar 16, 2022Updated 3 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- CVE-2022-30780 - lighttpd remote denial of service☆17Mar 16, 2024Updated last year
- Easy Extensible Plugins for PowerShell☆14Jul 1, 2024Updated last year
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆52Oct 28, 2025Updated 3 months ago
- Red-Teaming TempleOS.☆17Jul 29, 2022Updated 3 years ago
- A Windows 10 login phishing page for your red team exercises☆15Apr 25, 2021Updated 4 years ago
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆17Aug 19, 2022Updated 3 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆25Jun 14, 2022Updated 3 years ago
- Deepsearch leak database client, as an alternative for pwndb☆15Dec 6, 2022Updated 3 years ago
- Overwrite MBR and add own custom message☆16Apr 1, 2020Updated 5 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- The Last Web Recon Tool You'll Need☆17Nov 7, 2020Updated 5 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆23Feb 11, 2025Updated last year
- WinLogon I/O (LogonUI) Plugin for PowerRemoteDesktop☆28Feb 3, 2022Updated 4 years ago
- A verified list of fake ID vendors with links for educational reference.☆20Jan 15, 2024Updated 2 years ago
- A module for interacting with the ConfigMgr AdminService☆27Oct 20, 2023Updated 2 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- A daemonized DDexec.☆30Mar 22, 2025Updated 11 months ago
- Windows Thread Pool Injection Havoc Implementation☆33Mar 23, 2024Updated last year
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 7 years ago
- Front page README of my GitHub profile☆34Updated this week
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Jul 12, 2024Updated last year
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Sep 3, 2025Updated 5 months ago
- PowerShell meets GPT - Artificial Intelligence☆35Mar 1, 2023Updated 2 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆34Aug 26, 2022Updated 3 years ago
- The telegram bot provides basic subscription for premium (non telegram premium, only bot's own). Uses some telegram payment methods☆10Mar 30, 2023Updated 2 years ago
- Find the zone of the mobile number using the suffix code☆14Aug 17, 2022Updated 3 years ago
- ☆14Apr 29, 2021Updated 4 years ago
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- ☆11Oct 14, 2020Updated 5 years ago
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago