A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js, Express, and MongoDB.
☆308Dec 16, 2025Updated 4 months ago
Alternatives and similar repositories for PentestOPS
Users that are interested in PentestOPS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HackTheWeb is a production-ready, AI-powered web application penetration testing tool designed for security professionals and ethical hac…☆35Oct 5, 2025Updated 7 months ago
- EmailCrawl - is a professional-grade OSINT (Open Source Intelligence) tool designed for advanced email address extraction through compreh…☆164Jan 26, 2026Updated 3 months ago
- Scans remote JavaScript files with Trufflehog + Semgrep to detect leaked secrets☆142Jan 21, 2025Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Mattermost is an open source platform for secure collaboration across the entire software development lifecycle..☆28Oct 20, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆57Nov 18, 2025Updated 5 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆643Sep 20, 2025Updated 7 months ago
- AutoPentestX – Automated Pentesting & Vulnerability Reporting Tool☆1,123Feb 2, 2026Updated 3 months ago
- ToolShell scanner - CVE-2025-53770 and detection information☆19Dec 7, 2025Updated 5 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Docker poc lab for CVE-2025-55182 / CVE-2025-66478 (React2Shell) detection and exploitation☆81Dec 11, 2025Updated 4 months ago
- command control framework☆33Apr 29, 2026Updated last week
- Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁☆40Sep 20, 2025Updated 7 months ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- It’s an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs m…☆83Nov 20, 2025Updated 5 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- A dynamic, Flask-based web application providing a centralized interface for executing various open-source intelligence (OSINT) and cyber…☆42Apr 25, 2026Updated 2 weeks ago
- A modern platform for visual, flexible, and extensible graph-based investigations. For cybersecurity analysts and investigators.☆3,392Apr 29, 2026Updated last week
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆47Updated this week
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆198Updated this week
- test☆95Apr 25, 2026Updated 2 weeks ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A simple self-hosted tool to capture, inspect, and debug incoming webhooks in real time.☆28May 2, 2026Updated last week
- Analyze Android native `.so` files☆122Jul 28, 2025Updated 9 months ago
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆40Jan 23, 2026Updated 3 months ago
- Red Team Scaner☆61Mar 28, 2026Updated last month
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆56Dec 21, 2025Updated 4 months ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆238Dec 20, 2025Updated 4 months ago
- Multi-functional Web Recon & Vulnerability Scanner Tool☆35May 2, 2022Updated 4 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 3 months ago
- Bug Hunter is a command-line tool designed to assist in the bug hunting process for web applications. It automates several tasks such as …☆139Oct 30, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple Python Script to bypass Facebook profile picture guard and get the profile picture at full resolution☆13Oct 23, 2019Updated 6 years ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆210Nov 18, 2025Updated 5 months ago
- ☆40Dec 27, 2025Updated 4 months ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆17Nov 11, 2016Updated 9 years ago
- ☆40Feb 27, 2026Updated 2 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆152Dec 6, 2025Updated 5 months ago
- ☆303Apr 8, 2026Updated last month