This a collection of the code that I have written for the Poor Man's Pentest presentation.
☆581May 18, 2021Updated 4 years ago
Alternatives and similar repositories for poor-mans-pentest
Users that are interested in poor-mans-pentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fancy reverse and bind shell handler☆2,886Aug 9, 2024Updated last year
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆150Jul 21, 2022Updated 3 years ago
- This repository houses some of the small scripts I had used to quickly document throughout my OSCP course. This was referenced on YouTube…☆183Oct 7, 2019Updated 6 years ago
- Katana - Automatic CTF Challenge Solver in Python3☆1,351Mar 7, 2024Updated 2 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆35Apr 5, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.☆2,907May 6, 2023Updated 3 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,768May 1, 2026Updated last week
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆59May 16, 2021Updated 4 years ago
- ☆1,161Apr 21, 2021Updated 5 years ago
- The purpose of this repository is to archive any extraneous documents, or anything else that really has no specific category but needs a …☆84Aug 9, 2019Updated 6 years ago
- Ansible playbooks to install various utility and security tools to localhost☆29Aug 5, 2019Updated 6 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,943Sep 23, 2022Updated 3 years ago
- ☆22Dec 24, 2021Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,912Sep 6, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,442Apr 22, 2026Updated 2 weeks ago
- An Obsidian vault to Github Pages workflow to hopefully make me take notes☆51Mar 14, 2022Updated 4 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,897Updated this week
- Windows / Linux Local Privilege Escalation Workshop☆2,076Oct 9, 2022Updated 3 years ago
- Compress a Python script to a command-line one-liner☆78Dec 31, 2022Updated 3 years ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆4,098Mar 8, 2026Updated 2 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,989Jan 28, 2026Updated 3 months ago
- The ultimate WinRM shell for hacking/pentesting☆5,370Mar 10, 2026Updated last month
- Test tool for CVE-2020-1472☆37Jul 1, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool to perform Kerberos pre-auth bruteforcing☆3,318Aug 20, 2024Updated last year
- These are my notes and setup scripts while installing and preparing my Arch Linux environment.☆71Jun 22, 2021Updated 4 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,885Apr 25, 2024Updated 2 years ago
- LXD Image: Alpine 3.7 (Apache, PHP5.6)☆13Apr 5, 2018Updated 8 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,691Updated this week
- Monitor linux processes without root permissions☆5,992Mar 1, 2026Updated 2 months ago
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆13,178Apr 20, 2026Updated 2 weeks ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆805Oct 23, 2020Updated 5 years ago
- Kali Linux Fixes for Newly Imported VM's☆2,408Jun 30, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆2,776Aug 7, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- Red Teaming & Pentesting checklists for various engagements☆2,652Jul 27, 2025Updated 9 months ago
- A communal outpouring of online resources for learning different things in cybersecurity☆476Sep 19, 2021Updated 4 years ago
- A script that you can run in the background!☆3,076Jul 30, 2024Updated last year
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆665Aug 4, 2025Updated 9 months ago
- Multi-threaded Python Port Scanner with Nmap Integration☆393Sep 4, 2022Updated 3 years ago