EntySec / PexLinks
Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming language.
☆48Updated last year
Alternatives and similar repositories for Pex
Users that are interested in Pex are comparing it to the libraries listed below
Sorting:
- Make a Fake wireless access point aka Evil Twin....Easily!!☆71Updated 2 years ago
- HacKing Tools Downloader: Downloading HacKing Tools and exporting by categories to $HOME directory☆87Updated 3 years ago
- Rogue access point tool.☆57Updated 3 years ago
- GUI based tool to track location and more info of mobile numbers☆81Updated 2 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆65Updated 2 years ago
- L3MON Legacy - Remote Android Management Suite☆33Updated 2 years ago
- BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack☆55Updated 6 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆33Updated 6 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆87Updated last year
- Hacking every email by use script Mr.Robot☆57Updated 7 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Updated 6 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- An Advanced Tool to Crack Any Password Protected ZIP File With different Techniques. A very Beginner Friendly Script For Newbies.☆109Updated 4 months ago
- Tsunami-Fi is simple multi-tool bash application for Wi-Fi attacks☆65Updated 3 years ago
- Make a 100% FUD Android Trojan and Bypass All Anti-Viruses + Android Google Play Protector☆100Updated 3 months ago
- 🔥Ready, Aim, Fire.🔥☆18Updated 3 years ago
- The "Mailer" tool is a Python script for conducting simulated cyber attacks, including phishing attacks on social media platforms like Fa…☆66Updated 8 months ago
- Best social media phishing☆25Updated 5 years ago
- Send anonymous text messages with TOR and the TextBelt API☆67Updated 4 years ago
- AndroMW - control your android device without internet☆34Updated 2 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆13Updated 2 weeks ago
- SMS Spoofer | Graphical User Interface application☆52Updated 4 years ago
- GPS Location Tracer Using Malicious URL☆148Updated last year
- Anubis 7.0☆27Updated last year
- Run you Localhost Server☆27Updated last year
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆25Updated 5 years ago
- LoVerst is a backdoor generator and backdoor generating tools.☆71Updated 3 years ago
- The ultimate Metasploit apk binder with legit apk written in python3☆35Updated 3 years ago
- The Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commands…☆46Updated 4 years ago
- #Just simple program to spoofing device by sending malicious link☆29Updated 3 years ago