This a collection of the code that I have written for the Poor Man's Pentest presentation.
☆579May 18, 2021Updated 4 years ago
Alternatives and similar repositories for poor-mans-pentest
Users that are interested in poor-mans-pentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fancy reverse and bind shell handler☆2,876Aug 9, 2024Updated last year
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆150Jul 21, 2022Updated 3 years ago
- This repository houses some of the small scripts I had used to quickly document throughout my OSCP course. This was referenced on YouTube…☆182Oct 7, 2019Updated 6 years ago
- Katana - Automatic CTF Challenge Solver in Python3☆1,347Mar 7, 2024Updated 2 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆35Apr 5, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.☆2,895May 6, 2023Updated 2 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,578Mar 23, 2026Updated last week
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆59May 16, 2021Updated 4 years ago
- ☆1,160Apr 21, 2021Updated 4 years ago
- The purpose of this repository is to archive any extraneous documents, or anything else that really has no specific category but needs a …☆84Aug 9, 2019Updated 6 years ago
- Ansible playbooks to install various utility and security tools to localhost☆29Aug 5, 2019Updated 6 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,934Sep 23, 2022Updated 3 years ago
- ☆22Dec 24, 2021Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,877Sep 6, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,293Mar 16, 2026Updated 2 weeks ago
- An Obsidian vault to Github Pages workflow to hopefully make me take notes☆51Mar 14, 2022Updated 4 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,874Dec 25, 2023Updated 2 years ago
- Windows / Linux Local Privilege Escalation Workshop☆2,064Oct 9, 2022Updated 3 years ago
- Compress a Python script to a command-line one-liner☆78Dec 31, 2022Updated 3 years ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆4,066Mar 8, 2026Updated 3 weeks ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,956Jan 28, 2026Updated 2 months ago
- The ultimate WinRM shell for hacking/pentesting☆5,306Mar 10, 2026Updated 2 weeks ago
- Test tool for CVE-2020-1472☆37Jul 1, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tool to perform Kerberos pre-auth bruteforcing☆3,286Aug 20, 2024Updated last year
- These are my notes and setup scripts while installing and preparing my Arch Linux environment.☆72Jun 22, 2021Updated 4 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,816Apr 25, 2024Updated last year
- LXD Image: Alpine 3.7 (Apache, PHP5.6)☆13Apr 5, 2018Updated 7 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,576Mar 20, 2026Updated last week
- Monitor linux processes without root permissions☆5,939Mar 1, 2026Updated 3 weeks ago
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,845Mar 3, 2026Updated 3 weeks ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆799Oct 23, 2020Updated 5 years ago
- ☆2,754Aug 7, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Kali Linux Fixes for Newly Imported VM's☆2,404Jun 30, 2025Updated 9 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- Red Teaming & Pentesting checklists for various engagements☆2,649Jul 27, 2025Updated 8 months ago
- A communal outpouring of online resources for learning different things in cybersecurity☆473Sep 19, 2021Updated 4 years ago
- A script that you can run in the background!☆3,062Jul 30, 2024Updated last year
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆658Aug 4, 2025Updated 7 months ago
- Multi-threaded Python Port Scanner with Nmap Integration☆389Sep 4, 2022Updated 3 years ago