Rex library for various exploitation helpers
☆21Sep 24, 2025Updated 7 months ago
Alternatives and similar repositories for rex-exploitation
Users that are interested in rex-exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14Apr 14, 2026Updated 2 weeks ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Apr 21, 2026Updated last week
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- MSF database code, gemified☆55Apr 21, 2026Updated last week
- Created by David Maloney via the GitHub Connector☆12Apr 14, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Rex library for text generation and manipulation☆21Apr 13, 2026Updated 2 weeks ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- Rex provides a variety of classes useful for security testing and exploit development.☆51Oct 4, 2023Updated 2 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 14 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- A simple remote scanner for Sitecore CMS☆13May 28, 2024Updated last year
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆23Oct 31, 2018Updated 7 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PacketFu, a mid-level packet manipulation library for Ruby☆35Feb 28, 2024Updated 2 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 10 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- Cryptocurrency mixer☆10Jan 28, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Vulnserver exploits☆14May 1, 2020Updated 6 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- ☆14Mar 31, 2018Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- ☆17May 29, 2015Updated 10 years ago
- wow64 syscall filter☆14Nov 12, 2014Updated 11 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 12 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Custom Metasploit logos☆54Nov 13, 2021Updated 4 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- TUI Wallet for Monero – the secure, private, untraceable cryptocurrency☆12Apr 13, 2025Updated last year
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- ELF binary infector☆33May 25, 2011Updated 14 years ago