A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js, Express, and MongoDB.
☆307Dec 16, 2025Updated 4 months ago
Alternatives and similar repositories for PentestOPS
Users that are interested in PentestOPS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Unified Vulnerability Intelligence Platform☆69Dec 21, 2025Updated 3 months ago
- HackTheWeb is a production-ready, AI-powered web application penetration testing tool designed for security professionals and ethical hac…☆33Oct 5, 2025Updated 6 months ago
- Scans remote JavaScript files with Trufflehog + Semgrep to detect leaked secrets☆143Jan 21, 2025Updated last year
- Mattermost is an open source platform for secure collaboration across the entire software development lifecycle..☆28Oct 20, 2025Updated 5 months ago
- ☆57Nov 18, 2025Updated 5 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Oct 14, 2025Updated 6 months ago
- AutoPentestX – Automated Pentesting & Vulnerability Reporting Tool☆1,048Feb 2, 2026Updated 2 months ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 4 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- command control framework☆33Apr 3, 2026Updated 2 weeks ago
- Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁☆40Sep 20, 2025Updated 6 months ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 4 months ago
- It’s an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs m…☆82Nov 20, 2025Updated 4 months ago
- Reverse proxy for Claude Code that anonymizes sensitive pentest data (IPs, hashes, credentials, hostnames, PII) before it reaches Ant…☆97Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- A dynamic, Flask-based web application providing a centralized interface for executing various open-source intelligence (OSINT) and cyber…☆43Sep 19, 2025Updated 6 months ago
- A curated list of awesome Hacking tutorials, tools and resources☆103Oct 9, 2018Updated 7 years ago
- Tool to parse subdomains from dmarc.live☆152Apr 19, 2024Updated last year
- EmailCrawl - is a professional-grade OSINT (Open Source Intelligence) tool designed for advanced email address extraction through compreh…☆163Jan 26, 2026Updated 2 months ago
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆193Mar 25, 2026Updated 3 weeks ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Analyze Android native `.so` files☆122Jul 28, 2025Updated 8 months ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆67Feb 22, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆40Jan 23, 2026Updated 2 months ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Red Team Scaner☆60Mar 28, 2026Updated 3 weeks ago
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆56Dec 21, 2025Updated 3 months ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆35Jul 13, 2025Updated 9 months ago
- Bug Hunter is a command-line tool designed to assist in the bug hunting process for web applications. It automates several tasks such as …☆139Oct 30, 2025Updated 5 months ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 2 months ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆208Nov 18, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆151Dec 6, 2025Updated 4 months ago
- ☆40Dec 27, 2025Updated 3 months ago
- ☆39Feb 27, 2026Updated last month
- ☆281Apr 8, 2026Updated last week
- A python script that checks for many vulnerabilities, such as XSS, SQL Injection, CSRF, etc.☆33Updated this week
- AntiHunter Perimeter Defense Systems☆112Apr 10, 2026Updated last week