Rex library for various exploitation helpers
☆21Sep 24, 2025Updated 5 months ago
Alternatives and similar repositories for rex-exploitation
Users that are interested in rex-exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 10 months ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Feb 9, 2026Updated last month
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- MSF database code, gemified☆55Mar 5, 2026Updated 2 weeks ago
- Created by David Maloney via the GitHub Connector☆12Jul 10, 2025Updated 8 months ago
- Rex library for text generation and manipulation☆21Apr 9, 2025Updated 11 months ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- Rex provides a variety of classes useful for security testing and exploit development.☆51Oct 4, 2023Updated 2 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 14 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- A simple remote scanner for Sitecore CMS☆13May 28, 2024Updated last year
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆23Oct 31, 2018Updated 7 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- PacketFu, a mid-level packet manipulation library for Ruby☆35Feb 28, 2024Updated 2 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Cryptocurrency mixer☆10Jan 28, 2021Updated 5 years ago
- Vulnserver exploits☆15May 1, 2020Updated 5 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Archive of Metasploit Framework v3 (Pre-Rapid7)☆10Aug 24, 2014Updated 11 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- ☆17May 29, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- Custom Metasploit logos☆54Nov 13, 2021Updated 4 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- TUI Wallet for Monero – the secure, private, untraceable cryptocurrency☆12Apr 13, 2025Updated 11 months ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- ☆14Oct 3, 2018Updated 7 years ago