Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effective.
☆99Sep 27, 2025Updated 6 months ago
Alternatives and similar repositories for Offensive-Pentesting-Scripts
Users that are interested in Offensive-Pentesting-Scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆105Feb 12, 2025Updated last year
- Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers every…☆37Jan 6, 2025Updated last year
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆434Mar 16, 2026Updated 3 weeks ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 7 months ago
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Just some random Red Team Scripts that can be useful☆153Jun 28, 2024Updated last year
- NeXSS is a modern, self-hosted Blind XSS (Cross-Site Scripting) hunter and callback listener built with Next.js. It helps security resear…☆30Jan 14, 2026Updated 2 months ago
- ☆40May 4, 2025Updated 11 months ago
- robertfoster's PKGBUILD☆11Updated this week
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Mar 31, 2021Updated 5 years ago
- ☆11Dec 17, 2023Updated 2 years ago
- Burp Bounty Lab provides a safe, local target to validate that your Burp Bounty Pro scanner profiles detect vulnerabilities correctly. It…☆42Mar 16, 2026Updated 3 weeks ago
- All combinations of various characters, to get the desired word☆21Dec 13, 2023Updated 2 years ago
- Autorev.sh generates reverse shell codes for reverse shell . Supports linux and windows☆17Apr 8, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- IP/FQDN data structure helper with randomization of hosts and ports based on masscan internal logic☆69Jul 7, 2024Updated last year
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 11 months ago
- ☆27Aug 5, 2019Updated 6 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Automate Nuclei scans and streamline bug hunting workflows☆21Feb 16, 2024Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 5 months ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- ☆12Apr 5, 2025Updated last year
- Collections of Tools, Bookmarks, and other guides created to aid in OSINT collection☆18Aug 18, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- ☆11Jun 5, 2022Updated 3 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- ☆13Apr 6, 2022Updated 4 years ago
- Deploy a phishing infrastructure on the fly.☆78Dec 21, 2024Updated last year
- Master Kali Linux, Excel in Offensive Security☆33Jun 15, 2025Updated 9 months ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Mar 31, 2022Updated 4 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆68Feb 16, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- WordPress File Upload RCE Exploit☆16Sep 1, 2025Updated 7 months ago
- ☆28Updated this week
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆124Mar 31, 2026Updated last week
- 🌩Using CodeQL To Conduct JavaScript Security Analysis Against Modern Web Applications☆20Oct 16, 2024Updated last year
- Generate wordlists from Github repositories☆107Nov 25, 2023Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆81Jan 8, 2024Updated 2 years ago
- A standalone Blind XSS Script.☆48Aug 15, 2025Updated 7 months ago