Skip to content

sudo-DC404/overpowered-pentest-suite

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

⚑ OPS - Overpowered Pentest Suite

Python Version License Platform Security

Comprehensive Security Testing Framework with Interactive TUI and Powerful Integrations

Features β€’ Installation β€’ Usage β€’ Modules β€’ Documentation


🎯 Overview

OPS is a comprehensive penetration testing framework that combines custom scanning modules with industry-standard security tools in an intuitive Text User Interface (TUI). Built for security professionals, red teams, and penetration testers who need a unified platform for their security assessment workflows.

Why OPS?

  • 🎨 Beautiful TUI - Cyberpunk-themed interface with real-time progress tracking
  • πŸ”§ 10 Powerful Modules - Custom scanners + integrated tools (Nmap, SQLMap, Gobuster, Nikto)
  • πŸ”— Correlation Engine - Automatically discovers attack paths across findings
  • πŸ“Š Professional Reports - HTML/JSON export with executive summaries
  • ⚑ Fast & Efficient - Async scanning, multi-threading, smart caching
  • 🎯 Defensive Focus - Built for authorized security testing

✨ Features

πŸ–₯️ Interactive TUI

  • Real-time progress bars - Track scan execution live
  • Finding detail modals - Deep dive into vulnerabilities
  • Search & filter - Quickly find critical issues
  • Module configuration - Customize scan parameters on the fly
  • Keyboard shortcuts - Efficient navigation (Vim-style bindings)

πŸ” Built-in Modules

  1. Network Mapper - Host discovery, port scanning, topology mapping
  2. Cloud Hunter - Multi-cloud security scanner (AWS, Azure, GCP)
  3. Credential Analyzer - Defensive credential security analysis
  4. Web Scanner - HTTP/HTTPS vulnerability detection
  5. DNS Enumerator - Subdomain discovery & DNS reconnaissance
  6. Vuln Scanner - CVE detection & vulnerability assessment

πŸ› οΈ Integrated Tools

  1. Gobuster - Directory & DNS brute forcing
  2. SQLMap - SQL injection detection & exploitation
  3. Nikto - Web server vulnerability scanning
  4. Nmap - Advanced network reconnaissance

🧠 Intelligence

  • Correlation Engine - Cross-module attack path discovery
  • Risk Scoring - CVSS-based vulnerability prioritization
  • Finding Deduplication - Smart duplicate detection
  • Severity Assessment - Automatic impact analysis

πŸš€ Installation

⚠️ Having issues? See QUICK_START_FIX.md for fast troubleshooting!

Quick Install (Recommended)

# Clone the repository
git clone https://github.com/YOUR_USERNAME/overpowered-pentest-suite.git
cd overpowered-pentest-suite
chmod +x install.sh
./install.sh

Note: If you downloaded this as a ZIP file, extract it and run:

cd overpowered-pentest-suite
chmod +x install.sh
./install.sh

The installer will:

  • βœ… Install Python dependencies (with venv support)
  • βœ… Check for external tools (nmap, nikto, gobuster, sqlmap)
  • βœ… Create the ops command alias
  • βœ… Configure your PATH

After installation, verify everything works:

python3 check_dependencies.py

Manual Installation

# Install Python dependencies
pip install -r requirements.txt

# Install external tools (optional but recommended)
sudo apt install -y nmap nikto gobuster sqlmap

# Create command alias
chmod +x ops
ln -sf $(pwd)/ops ~/.local/bin/ops
export PATH="$HOME/.local/bin:$PATH"

Requirements

  • Python: 3.8 or higher
  • OS: Linux (Kali, Ubuntu, Debian, Arch)
  • Terminal: Any modern terminal with 256 color support
  • External Tools: nmap, nikto, gobuster, sqlmap (optional)

Verify Installation

After installing, verify everything works:

python3 check_dependencies.py

This will check all dependencies and show what's missing.


πŸ’» Usage

TUI Mode (Interactive)

Launch the full interactive interface:

ops

Keyboard Shortcuts:

  • q - Quit application
  • d - Dashboard
  • s - Scanner
  • r - Results
  • c - Configuration
  • F1 - Help
  • Ctrl+S - Start scan
  • Ctrl+O - Configure modules
  • Ctrl+F - Search findings
  • Escape - Go back

CLI Mode

Run scans from the command line:

# Basic network scan
ops scan --target 192.168.1.0/24 --module network_mapper

# Website vulnerability scan
ops scan --target https://example.com --module web_scanner,dns_enumerator

# Full scan with all modules
ops scan --target example.com --module all

# Custom configuration
ops scan --target 10.0.0.0/8 --config custom_scan.yaml

# Generate report from results
ops report --results scan_results.json --format html --output report.html

Example Workflows

1. Quick Web Application Assessment

ops
# Press 's' for Scanner
# Enter target: https://example.com
# Select: Web Scanner, DNS Enumerator, Gobuster, Nikto
# Press Ctrl+S to start

2. Network Penetration Test

ops scan --target 192.168.1.0/24 \
  --module network_mapper,nmap_tool,vuln_scanner \
  --output network_assessment.json

3. Cloud Security Audit

ops scan --target aws-prod \
  --module cloud_hunter \
  --config aws_config.yaml

πŸ“¦ Modules

Network Mapper

Purpose: Network discovery and topology mapping Features:

  • Fast host discovery
  • Port scanning (TCP/UDP)
  • Service detection
  • OS fingerprinting
  • Network visualization

Cloud Hunter

Purpose: Multi-cloud security assessment Providers: AWS, Azure, GCP Features:

  • IAM policy analysis
  • Storage bucket enumeration
  • Security group audit
  • Compliance checks

Web Scanner

Purpose: Web application vulnerability detection Features:

  • SSL/TLS validation
  • Security header analysis
  • CORS policy check
  • Cookie security

Gobuster

Purpose: Directory/DNS brute forcing Features:

  • Directory enumeration
  • DNS subdomain discovery
  • Custom wordlists

SQLMap

Purpose: SQL injection detection Features:

  • Automated SQLi detection
  • Database fingerprinting
  • Multiple injection techniques

Nikto

Purpose: Web server scanning Features:

  • 6700+ vulnerability checks
  • Misconfiguration detection

Nmap

Purpose: Advanced network scanning Features:

  • SYN/Connect/UDP scans
  • NSE script engine
  • OS detection

πŸ“Š Correlation Engine

OPS includes an intelligent correlation engine that:

  1. Discovers Attack Paths - Links findings across modules
  2. Risk Prioritization - Calculates combined risk scores
  3. Attack Surface Mapping - Visualizes entry points

Example Attack Path:

Open SSH Port β†’ Weak Version β†’ Default Credentials β†’ Privilege Escalation

πŸ”’ Security & Ethics

⚠️ IMPORTANT DISCLAIMER

This tool is designed for authorized security testing only.

  • βœ… Obtain proper written authorization before testing
  • βœ… Use only on systems you own or have permission to test
  • βœ… Comply with all applicable laws
  • ❌ Never use for malicious purposes

Unauthorized use may be illegal.


πŸ› οΈ Development

Project Structure

overpowered-pentest-suite/
β”œβ”€β”€ core/              # Core framework
β”œβ”€β”€ modules/           # Scanning modules
β”œβ”€β”€ tui/              # Text User Interface
β”œβ”€β”€ reports/          # Report generation
β”œβ”€β”€ ops               # Main launcher
└── requirements.txt  # Dependencies

Contributing

  1. Fork the repository
  2. Create a feature branch
  3. Commit your changes
  4. Open a Pull Request

πŸ“š Documentation

Need Help?

  • Installation issues? See TROUBLESHOOTING.md
  • Dependency problems? Run python3 check_dependencies.py
  • Usage questions? Check the documentation above

πŸ™ Acknowledgments

Built with:


πŸ“ License

MIT License - see LICENSE file


Made with ❀️ for the security community

⭐ Star this repo if you find it useful!

About

**Comprehensive Security Testing Framework with Interactive TUI and Powerful Integrations**

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors