Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/InfoSecWarrior/Offensive-Pentesting-Scripts
Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effective.
https://github.com/InfoSecWarrior/Offensive-Pentesting-Scripts
automation bash-script bugbounty gotools nmap-scripts pentesting subdomain-enumeration subdomain-wordlist
Last synced: 5 days ago
JSON representation
Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effective.
- Host: GitHub
- URL: https://github.com/InfoSecWarrior/Offensive-Pentesting-Scripts
- Owner: InfoSecWarrior
- Created: 2022-11-08T15:49:01.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2024-05-31T14:37:25.000Z (5 months ago)
- Last Synced: 2024-08-01T18:31:57.550Z (3 months ago)
- Topics: automation, bash-script, bugbounty, gotools, nmap-scripts, pentesting, subdomain-enumeration, subdomain-wordlist
- Language: Shell
- Homepage:
- Size: 163 KB
- Stars: 64
- Watchers: 1
- Forks: 17
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
Offensive Pentesting Scripts
This repository contains a collection of scripts that are intended to help you in your pen-testing and bug-hunting efforts. These scripts automate various manual tasks, making your work more efficient and effective. Descriptions of the scripts are given below:
To set up a pen-testing environment, we need to install lots of tools including various Go tools. Installing them one by one can be very time-consuming. So here we have a script that installs `over 40` important Go tools at once.
[Gotools Install](Gotools-Install)
Subdomain brute forcing is a useful technique for discovering hidden subdomains of the targets, which increases the chances of finding vulnerable systems. We have a script that creates a wordlist of `over 66 million` subdomains for this purpose.
[Subdomains Wordlists](Subdomains-Wordlists)
Identifying live hosts and open ports, and determining the version of services running on them from a list of targets can be a time-consuming and repetitive task. To automate this process, we have a script that takes a list of hosts as input and performs all of these tasks at once.
[Nmap Warrior](Nmap-Warrior)
This script finds subdomains using multiple tools and techniques to comprehensively search for subdomains and uncover any hidden subdomains of the targets. It automates the process of searching for subdomains, saving the time and effort of user. This script is a powerful tool for anyone who wants to discover subdomains and gain a deeper understanding of their target website's infrastructure.
[Passive Subdomains Warrior](Passive-Subdomains-Warrior)