rapid7 / rex-exploitationLinks
Rex library for various exploitation helpers
☆21Updated 4 months ago
Alternatives and similar repositories for rex-exploitation
Users that are interested in rex-exploitation are comparing it to the libraries listed below
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 13 years ago
- Fuzzing Framework☆10Updated 8 years ago
- NMAP NSE that enumerates VNC authentication types☆14Updated 15 years ago
- Automated install process for Phishing Frenzy☆24Updated 11 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆28Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- ☆12Updated 6 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- DHCP attack tool☆21Updated last year
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆37Updated 8 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Updated 7 years ago
- ☆28Updated 9 years ago
- ☆14Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Evil snippets of Underhanded Red Team tactics☆11Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 7 years ago
- POC for IAT Parsing Payloads☆48Updated 9 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Updated 12 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Updated 11 years ago