rapid7 / rex-socket
The Rex Socket Abstraction Library
☆12Updated last week
Alternatives and similar repositories for rex-socket:
Users that are interested in rex-socket are comparing it to the libraries listed below
- Popping boxes with Nmap☆18Updated 13 years ago
- Wireshark regression tests☆11Updated 4 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 11 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- recon framework in ruby☆13Updated 13 years ago
- ☆15Updated 8 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Rex library for various exploitation helpers☆21Updated 2 months ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- ☆9Updated 2 months ago
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- Network Guardian☆12Updated 7 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Various pentest scripts☆13Updated 11 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago