This a collection of the code that I have written for the Poor Man's Pentest presentation.
☆580May 18, 2021Updated 4 years ago
Alternatives and similar repositories for poor-mans-pentest
Users that are interested in poor-mans-pentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fancy reverse and bind shell handler☆2,883Aug 9, 2024Updated last year
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆150Jul 21, 2022Updated 3 years ago
- This repository houses some of the small scripts I had used to quickly document throughout my OSCP course. This was referenced on YouTube…☆183Oct 7, 2019Updated 6 years ago
- Katana - Automatic CTF Challenge Solver in Python3☆1,350Mar 7, 2024Updated 2 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆35Apr 5, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.☆2,899May 6, 2023Updated 2 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,681Updated this week
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆59May 16, 2021Updated 4 years ago
- ☆1,159Apr 21, 2021Updated 4 years ago
- The purpose of this repository is to archive any extraneous documents, or anything else that really has no specific category but needs a …☆84Aug 9, 2019Updated 6 years ago
- Ansible playbooks to install various utility and security tools to localhost☆29Aug 5, 2019Updated 6 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,939Sep 23, 2022Updated 3 years ago
- ☆22Dec 24, 2021Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,897Sep 6, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,854Apr 8, 2026Updated last week
- An Obsidian vault to Github Pages workflow to hopefully make me take notes☆51Mar 14, 2022Updated 4 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,882Dec 25, 2023Updated 2 years ago
- Windows / Linux Local Privilege Escalation Workshop☆2,072Oct 9, 2022Updated 3 years ago
- Compress a Python script to a command-line one-liner☆78Dec 31, 2022Updated 3 years ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆4,079Mar 8, 2026Updated last month
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,971Jan 28, 2026Updated 2 months ago
- The ultimate WinRM shell for hacking/pentesting☆5,339Mar 10, 2026Updated last month
- Test tool for CVE-2020-1472☆37Jul 1, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool to perform Kerberos pre-auth bruteforcing☆3,301Aug 20, 2024Updated last year
- These are my notes and setup scripts while installing and preparing my Arch Linux environment.☆71Jun 22, 2021Updated 4 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,851Apr 25, 2024Updated last year
- LXD Image: Alpine 3.7 (Apache, PHP5.6)☆13Apr 5, 2018Updated 8 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,631Apr 9, 2026Updated last week
- Monitor linux processes without root permissions☆5,959Mar 1, 2026Updated last month
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,916Apr 7, 2026Updated last week
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆799Oct 23, 2020Updated 5 years ago
- Kali Linux Fixes for Newly Imported VM's☆2,405Jun 30, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆2,768Aug 7, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- Red Teaming & Pentesting checklists for various engagements☆2,655Jul 27, 2025Updated 8 months ago
- A communal outpouring of online resources for learning different things in cybersecurity☆476Sep 19, 2021Updated 4 years ago
- A script that you can run in the background!☆3,064Jul 30, 2024Updated last year
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆661Aug 4, 2025Updated 8 months ago
- Multi-threaded Python Port Scanner with Nmap Integration☆391Sep 4, 2022Updated 3 years ago