Rex provides a variety of classes useful for security testing and exploit development.
☆51Oct 4, 2023Updated 2 years ago
Alternatives and similar repositories for rex
Users that are interested in rex are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 6 months ago
- Rex library for text generation and manipulation☆21Updated this week
- Use security tools from within IRC.☆24Mar 20, 2012Updated 14 years ago
- Created by David Maloney via the GitHub Connector☆12Mar 27, 2026Updated 2 weeks ago
- This is the main repository for metasm, a free assembler / disassembler / compiler written in ruby☆473Mar 10, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- ☆22May 25, 2017Updated 8 years ago
- Data Analysis Pipeline☆160Feb 13, 2025Updated last year
- ☆22Feb 13, 2025Updated last year
- ☆11Jan 16, 2018Updated 8 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Jan 15, 2026Updated 2 months ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Pattern recognition for hosts, services, and content☆767Mar 16, 2026Updated 3 weeks ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 10 years ago
- Archive of Metasploit Framework v3 (Pre-Rapid7)☆10Aug 24, 2014Updated 11 years ago
- ☆10Feb 18, 2016Updated 10 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- ELF binary infector☆33May 25, 2011Updated 14 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Set of Minimal C Utilities☆16Aug 21, 2015Updated 10 years ago
- ☆16Feb 1, 2023Updated 3 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Nov 1, 2019Updated 6 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 10 years ago
- PacketFu, a mid-level packet manipulation library for Ruby☆35Feb 28, 2024Updated 2 years ago
- Egregious is a rails based exception handling gem for well defined http exception handling for json, xml and html☆23Dec 19, 2018Updated 7 years ago
- Proof-of-Concept of exploits that may be published☆23Oct 24, 2024Updated last year
- crash poc & Leak info PoC☆17Mar 19, 2018Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Internet data processing tools☆54Jan 1, 2021Updated 5 years ago
- Maintains backlink structure among interlinked Markdown notes☆11Dec 28, 2020Updated 5 years ago
- a getting-started sample for Clojure and Solr☆11Aug 28, 2015Updated 10 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Nov 6, 2016Updated 9 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Jun 23, 2017Updated 8 years ago