Notes for efficient and easier engagements - notes over time
☆24Apr 1, 2021Updated 5 years ago
Alternatives and similar repositories for poor-mans-pentest-notes
Users that are interested in poor-mans-pentest-notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Research on UDP/TCP amplification vectors, payloads and mitigations against their use in DDoS Attacks☆394Dec 14, 2024Updated last year
- From IoT Pentesting to IoT Security☆23Jan 11, 2019Updated 7 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 5 months ago
- ☆10Apr 2, 2022Updated 4 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Awesome list of awesome methods, tutorials and more.☆19Jun 12, 2022Updated 3 years ago
- A semi-automatic osint/recon framework.☆25May 22, 2024Updated last year
- A tiny data wiping library and tool.☆24Oct 30, 2021Updated 4 years ago
- Python script to exploit F5 Big-IP CVE-2020-5902☆36Mar 19, 2024Updated 2 years ago
- A Pwning Toolkit☆28Jan 11, 2025Updated last year
- Email-Enum searches mainstream websites and tells you if an email is registered!☆19Mar 14, 2019Updated 7 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Intelligence gathering framework☆16Jul 23, 2015Updated 10 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Jun 7, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 这是一个shellcode简单的示例demo,使目标exe程序转换为shellcode可执行程序的一个demo【并不打算后期维护】,两年前写的,我发现被工作磨平了对技术的探索,今天翻到发现的。☆11Sep 23, 2023Updated 2 years ago
- A look into DDoS protecting OpenVPN servers using iptables BPF☆16Jun 17, 2021Updated 4 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 12 years ago
- all about android reverse engineering☆12Oct 3, 2020Updated 5 years ago
- Generate iTerm2 colors based on an image☆13Apr 6, 2026Updated last week
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- ORhunter is an Open Redirect Vulnerability Scanner which Passively Crawls URLs from 3 Sources & Then Filter Potential URLs based on Param…☆39Oct 2, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Image downloader for various imageboards and image albums written in Python.☆10Sep 21, 2019Updated 6 years ago
- Detect Phishing fetching Certificate Transparency Logs☆21Jan 13, 2021Updated 5 years ago
- A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.☆26Feb 5, 2026Updated 2 months ago
- Simple tool to dynamically discover hidden fastboot OEM commands based on static knowledge☆17Jan 6, 2026Updated 3 months ago
- ☆14Jun 28, 2023Updated 2 years ago
- berlin automatic mail encryption meetup 2016☆13Dec 16, 2016Updated 9 years ago
- ☆22Jun 28, 2018Updated 7 years ago
- This is a simple form that uses angular JS to automatically filter for just public Google Docs☆11Aug 21, 2013Updated 12 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A chat application that can ecnrypt messages with remote user's public Key and decrypt messages with local user's private Key☆11Jan 14, 2020Updated 6 years ago
- simple ham radio fox for esp32 / SA868☆22Aug 3, 2024Updated last year
- ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.☆12Nov 27, 2025Updated 4 months ago
- Shared lists of problem domains people may want to block with hosts files☆16Mar 3, 2025Updated last year
- A python wechat official account scrawler, using sougou search engine.☆13Aug 11, 2017Updated 8 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Detect malicious domain, Blablablablabla☆27Jan 8, 2017Updated 9 years ago