Rex library for various exploitation helpers
☆21Sep 24, 2025Updated 5 months ago
Alternatives and similar repositories for rex-exploitation
Users that are interested in rex-exploitation are comparing it to the libraries listed below
Sorting:
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 10 months ago
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- MSF database code, gemified☆55Feb 4, 2026Updated 3 weeks ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Feb 9, 2026Updated 3 weeks ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Rex library for text generation and manipulation☆21Apr 9, 2025Updated 10 months ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- ☆17May 29, 2015Updated 10 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- A simple remote scanner for Sitecore CMS☆13May 28, 2024Updated last year
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 12 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- Created by David Maloney via the GitHub Connector☆12Jul 10, 2025Updated 7 months ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Internet Radio based on the Beaglebone Black platform☆15Mar 4, 2016Updated 9 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- D-RAT SRC Extract☆12Dec 24, 2016Updated 9 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago