Rex provides a variety of classes useful for security testing and exploit development.
☆51Oct 4, 2023Updated 2 years ago
Alternatives and similar repositories for rex
Users that are interested in rex are comparing it to the libraries listed below
Sorting:
- Rex library for text generation and manipulation☆21Apr 9, 2025Updated 10 months ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 13 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- ☆22May 25, 2017Updated 8 years ago
- ☆10Feb 18, 2016Updated 10 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 12 years ago
- This cookbook installs Nexpose☆13Dec 15, 2023Updated 2 years ago
- Port of whitequark/parser's lexer in C☆14Nov 23, 2022Updated 3 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- Data Analysis Pipeline☆160Feb 13, 2025Updated last year
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Created by David Maloney via the GitHub Connector☆12Jul 10, 2025Updated 7 months ago
- ☆14Feb 7, 2018Updated 8 years ago
- Execute tasks across SSH hosts using random selection☆17May 6, 2020Updated 5 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Uncover IPv6 address harvesting through firewall log analysis☆13Jan 29, 2016Updated 10 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 9 years ago
- Alienvault Labs Projects Random Stuff☆79Sep 24, 2013Updated 12 years ago
- PacketFu, a mid-level packet manipulation library for Ruby☆393Jun 28, 2023Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Aug 25, 2016Updated 9 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Nov 6, 2016Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Nov 1, 2019Updated 6 years ago
- Generates IP, while Excluding/Including specific IP blocks. Useful in Mass Scanning.☆24Dec 24, 2014Updated 11 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- An example binary protocol application for learning CANAPE☆22Dec 14, 2014Updated 11 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- Extremely fast and efficient Ruby domain spider☆36Jan 17, 2014Updated 12 years ago
- A native Ruby implementation of the SMB Protocol Family☆81May 6, 2025Updated 9 months ago
- eBPF query runner (Ruby DSL or something useful)☆26Mar 11, 2020Updated 5 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 9 years ago