Rex provides a variety of classes useful for security testing and exploit development.
☆51Oct 4, 2023Updated 2 years ago
Alternatives and similar repositories for rex
Users that are interested in rex are comparing it to the libraries listed below
Sorting:
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- Rex library for text generation and manipulation☆21Apr 9, 2025Updated 11 months ago
- Created by David Maloney via the GitHub Connector☆12Jul 10, 2025Updated 8 months ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- ☆22May 25, 2017Updated 8 years ago
- A native Ruby implementation of the SMB Protocol Family☆81May 6, 2025Updated 10 months ago
- PacketFu, a mid-level packet manipulation library for Ruby☆394Jun 28, 2023Updated 2 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Port of whitequark/parser's lexer in C☆14Nov 23, 2022Updated 3 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- ☆14Feb 7, 2018Updated 8 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 10 years ago
- A Mediator and Observer pattern event library☆15Mar 8, 2026Updated 2 weeks ago
- Archive of Metasploit Framework v3 (Pre-Rapid7)☆10Aug 24, 2014Updated 11 years ago
- This cookbook installs Nexpose☆13Dec 15, 2023Updated 2 years ago
- YAP is a high-performance Prolog compiler☆12Mar 11, 2011Updated 15 years ago
- ☆10Feb 18, 2016Updated 10 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- Extremely fast and efficient Ruby domain spider☆36Jan 17, 2014Updated 12 years ago
- Linux rootkit and detection examples☆32Jan 3, 2016Updated 10 years ago
- ☆15May 12, 2025Updated 10 months ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Nov 1, 2019Updated 6 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 10 years ago
- PacketFu, a mid-level packet manipulation library for Ruby☆35Feb 28, 2024Updated 2 years ago
- BurpSuite Pro Python Extension☆18Jul 11, 2013Updated 12 years ago
- Proof-of-Concept of exploits that may be published☆23Oct 24, 2024Updated last year
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 8 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Jun 23, 2017Updated 8 years ago
- Malice VirusTotal Plugin☆12Feb 24, 2019Updated 7 years ago