A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.
☆20Nov 13, 2025Updated 4 months ago
Alternatives and similar repositories for pentestgod
Users that are interested in pentestgod are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notes for CRTP☆42Dec 18, 2020Updated 5 years ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆241Dec 4, 2022Updated 3 years ago
- Penetration Testing Interview Questions☆53Apr 15, 2022Updated 3 years ago
- ☆40Jan 12, 2022Updated 4 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- My Personal Notes of OSEP☆40Jun 1, 2023Updated 2 years ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆17Jul 27, 2024Updated last year
- Cool resources and content for bug bounty hunting.☆19Oct 1, 2021Updated 4 years ago
- This Repo Contain Summary of The eLearnSecurity Web Application Penetration Tester certification Content☆20Apr 9, 2022Updated 3 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆64Nov 10, 2019Updated 6 years ago
- This repo. has my notes and some practice questions from the ICCA exam by INE.☆18Aug 24, 2024Updated last year
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Jun 11, 2023Updated 2 years ago
- Python implementation of select MicroBurst scripts.☆14Aug 19, 2021Updated 4 years ago
- ☆18Jun 10, 2025Updated 9 months ago
- Self Delete DLL☆22Feb 15, 2024Updated 2 years ago
- open source vulnerability scanner and information gathering tool☆16Jan 28, 2025Updated last year
- offensive notes & resources☆43Apr 7, 2025Updated 11 months ago
- ☆16Feb 6, 2024Updated 2 years ago
- A cross site scripting command and control notification server☆23Mar 24, 2024Updated 2 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 3 years ago
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆87Feb 22, 2026Updated last month
- All kinds of infosec learning related stuff.☆36Oct 3, 2021Updated 4 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- Stuff done in preparation for AWAE course and OSWE certification☆155Oct 29, 2020Updated 5 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- ☆50May 12, 2021Updated 4 years ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- API Hammering with C++20☆51Jul 21, 2022Updated 3 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- Reverse shell for remote administration☆29Feb 12, 2018Updated 8 years ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆69Aug 4, 2025Updated 7 months ago
- Test the speed and reliability of a list of DNS servers☆22Dec 9, 2020Updated 5 years ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆48Nov 9, 2025Updated 4 months ago
- slides for hardware hacking course produced by security society channel i introduce☆14Dec 29, 2021Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago