A place to store my various pentesting related code thats too small/niche to justify its own repository, and a simple website with notes on pentesting.
☆40Apr 30, 2026Updated this week
Alternatives and similar repositories for pentesting_stuff
Users that are interested in pentesting_stuff are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Several XStream gadgets ported from ysoserial☆33Sep 26, 2021Updated 4 years ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- ☆18Dec 4, 2025Updated 5 months ago
- All around cracking wordlist.☆31Oct 25, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- ☆32Dec 28, 2023Updated 2 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- A collection of awesome penetration testing resources☆13Jan 13, 2019Updated 7 years ago
- Vulnerable server used for learning software exploitation☆1,114Oct 9, 2020Updated 5 years ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆10Apr 25, 2021Updated 5 years ago
- Journey to Try Harder !!!☆31Aug 30, 2019Updated 6 years ago
- Ansible Provisioned Security Testing Platform☆17Oct 19, 2016Updated 9 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 13 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆11Jun 14, 2022Updated 3 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- ☆19Apr 29, 2019Updated 7 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆13Jan 24, 2021Updated 5 years ago
- ☆14Nov 15, 2020Updated 5 years ago
- A Burp Suite extension for Lightning/Aura framework security testing with advanced action management, context editing, and comprehensive …☆63Mar 2, 2026Updated 2 months ago
- ☆14Sep 30, 2020Updated 5 years ago
- HEVD Exploits for fun and learning.☆16Aug 30, 2025Updated 8 months ago
- Small Helper Library to increase automatically the file descriptors limits for the current process☆24Jul 10, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- Pentesting notes☆19Updated this week
- Other tools developed by CIRT.net☆25Aug 2, 2020Updated 5 years ago
- Network white noise collector☆19Mar 23, 2016Updated 10 years ago
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- Web Sight Front-end Community Edition☆24May 25, 2020Updated 5 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Apr 20, 2026Updated 2 weeks ago
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆63Jul 15, 2021Updated 4 years ago
- exploit development☆49Mar 14, 2018Updated 8 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Cpanel Brute Force Tool (Perl)☆17Jan 1, 2014Updated 12 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Nov 19, 2020Updated 5 years ago
- A wrapper library for the set of ptrace-related system calls in Linux☆13May 20, 2014Updated 11 years ago