Rex library for various exploitation helpers
☆21Sep 24, 2025Updated 6 months ago
Alternatives and similar repositories for rex-exploitation
Users that are interested in rex-exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 11 months ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Feb 9, 2026Updated 2 months ago
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- MSF database code, gemified☆55Mar 5, 2026Updated last month
- Created by David Maloney via the GitHub Connector☆12Mar 27, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Rex library for text generation and manipulation☆21Updated this week
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- Rex provides a variety of classes useful for security testing and exploit development.☆51Oct 4, 2023Updated 2 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 14 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- A simple remote scanner for Sitecore CMS☆13May 28, 2024Updated last year
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆23Oct 31, 2018Updated 7 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 10 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Cryptocurrency mixer☆10Jan 28, 2021Updated 5 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Archive of Metasploit Framework v3 (Pre-Rapid7)☆10Aug 24, 2014Updated 11 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- ☆14Mar 31, 2018Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- ☆17May 29, 2015Updated 10 years ago
- wow64 syscall filter☆14Nov 12, 2014Updated 11 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 12 years ago
- Custom Metasploit logos☆54Nov 13, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- TUI Wallet for Monero – the secure, private, untraceable cryptocurrency☆12Apr 13, 2025Updated 11 months ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- ELF binary infector☆33May 25, 2011Updated 14 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago