Notes for efficient and easier engagements - notes over time
☆24Apr 1, 2021Updated 5 years ago
Alternatives and similar repositories for poor-mans-pentest-notes
Users that are interested in poor-mans-pentest-notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 6 months ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Dec 17, 2021Updated 4 years ago
- Awesome list of awesome methods, tutorials and more.☆19Jun 12, 2022Updated 3 years ago
- A semi-automatic osint/recon framework.☆25May 22, 2024Updated last year
- Python script to exploit F5 Big-IP CVE-2020-5902☆36Mar 19, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆13Jun 7, 2021Updated 4 years ago
- Ragno is a Passive URL Crawler | Written in Python3 | Fetches URLs from the Wayback Machine, AlienVault's Open Threat Exchange & Common C…☆22Sep 1, 2025Updated 8 months ago
- 这是一个shellcode简单的示例demo,使目标exe程序转换为shellcode可执行程序的一个demo【并不打算后期维护】,两年前写的,我发现被工作磨平了对技术的探索,今天翻到发现的。☆11Sep 23, 2023Updated 2 years ago
- A collection of malware samples caught by DIONAEA Honeypot☆12May 29, 2019Updated 6 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- A look into DDoS protecting OpenVPN servers using iptables BPF☆16Jun 17, 2021Updated 4 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 12 years ago
- all about android reverse engineering☆12Oct 3, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- ORhunter is an Open Redirect Vulnerability Scanner which Passively Crawls URLs from 3 Sources & Then Filter Potential URLs based on Param…☆40Oct 2, 2023Updated 2 years ago
- ☆14Mar 9, 2023Updated 3 years ago
- A collection of cpuid instruction implementations for anti-vm purposes.☆10Oct 5, 2023Updated 2 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- ☆15Aug 13, 2014Updated 11 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Image downloader for various imageboards and image albums written in Python.☆10Sep 21, 2019Updated 6 years ago
- Firewall rules for cloudflare.☆17Jan 20, 2023Updated 3 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 6 months ago
- eCPPTv2 Notes☆13Jun 13, 2021Updated 4 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- Surgical python tool to assist in LFI discovery☆13Sep 2, 2018Updated 7 years ago
- A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.☆26Feb 5, 2026Updated 3 months ago
- Simple tool to dynamically discover hidden fastboot OEM commands based on static knowledge☆17Jan 6, 2026Updated 4 months ago
- ☆14Jun 28, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- berlin automatic mail encryption meetup 2016☆13Dec 16, 2016Updated 9 years ago
- ☆22Jun 28, 2018Updated 7 years ago
- simple ham radio fox for esp32 / SA868☆23Aug 3, 2024Updated last year
- Malicious DLL Generator in Py3☆27Jul 8, 2020Updated 5 years ago
- A python wechat official account scrawler, using sougou search engine.☆13Aug 11, 2017Updated 8 years ago
- Subdover is a MultiThreaded Subdomain Takeover Vulnerability Scanner Written In Python3☆109Oct 2, 2023Updated 2 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago