Comprehensive Security Testing Framework with Interactive TUI and Powerful Integrations
Features β’ Installation β’ Usage β’ Modules β’ Documentation
OPS is a comprehensive penetration testing framework that combines custom scanning modules with industry-standard security tools in an intuitive Text User Interface (TUI). Built for security professionals, red teams, and penetration testers who need a unified platform for their security assessment workflows.
- π¨ Beautiful TUI - Cyberpunk-themed interface with real-time progress tracking
- π§ 10 Powerful Modules - Custom scanners + integrated tools (Nmap, SQLMap, Gobuster, Nikto)
- π Correlation Engine - Automatically discovers attack paths across findings
- π Professional Reports - HTML/JSON export with executive summaries
- β‘ Fast & Efficient - Async scanning, multi-threading, smart caching
- π― Defensive Focus - Built for authorized security testing
- Real-time progress bars - Track scan execution live
- Finding detail modals - Deep dive into vulnerabilities
- Search & filter - Quickly find critical issues
- Module configuration - Customize scan parameters on the fly
- Keyboard shortcuts - Efficient navigation (Vim-style bindings)
- Network Mapper - Host discovery, port scanning, topology mapping
- Cloud Hunter - Multi-cloud security scanner (AWS, Azure, GCP)
- Credential Analyzer - Defensive credential security analysis
- Web Scanner - HTTP/HTTPS vulnerability detection
- DNS Enumerator - Subdomain discovery & DNS reconnaissance
- Vuln Scanner - CVE detection & vulnerability assessment
- Gobuster - Directory & DNS brute forcing
- SQLMap - SQL injection detection & exploitation
- Nikto - Web server vulnerability scanning
- Nmap - Advanced network reconnaissance
- Correlation Engine - Cross-module attack path discovery
- Risk Scoring - CVSS-based vulnerability prioritization
- Finding Deduplication - Smart duplicate detection
- Severity Assessment - Automatic impact analysis
β οΈ Having issues? See QUICK_START_FIX.md for fast troubleshooting!
# Clone the repository
git clone https://github.com/YOUR_USERNAME/overpowered-pentest-suite.git
cd overpowered-pentest-suite
chmod +x install.sh
./install.shNote: If you downloaded this as a ZIP file, extract it and run:
cd overpowered-pentest-suite
chmod +x install.sh
./install.shThe installer will:
- β Install Python dependencies (with venv support)
- β Check for external tools (nmap, nikto, gobuster, sqlmap)
- β
Create the
opscommand alias - β Configure your PATH
After installation, verify everything works:
python3 check_dependencies.py# Install Python dependencies
pip install -r requirements.txt
# Install external tools (optional but recommended)
sudo apt install -y nmap nikto gobuster sqlmap
# Create command alias
chmod +x ops
ln -sf $(pwd)/ops ~/.local/bin/ops
export PATH="$HOME/.local/bin:$PATH"- Python: 3.8 or higher
- OS: Linux (Kali, Ubuntu, Debian, Arch)
- Terminal: Any modern terminal with 256 color support
- External Tools: nmap, nikto, gobuster, sqlmap (optional)
After installing, verify everything works:
python3 check_dependencies.pyThis will check all dependencies and show what's missing.
Launch the full interactive interface:
opsKeyboard Shortcuts:
q- Quit applicationd- Dashboards- Scannerr- Resultsc- ConfigurationF1- HelpCtrl+S- Start scanCtrl+O- Configure modulesCtrl+F- Search findingsEscape- Go back
Run scans from the command line:
# Basic network scan
ops scan --target 192.168.1.0/24 --module network_mapper
# Website vulnerability scan
ops scan --target https://example.com --module web_scanner,dns_enumerator
# Full scan with all modules
ops scan --target example.com --module all
# Custom configuration
ops scan --target 10.0.0.0/8 --config custom_scan.yaml
# Generate report from results
ops report --results scan_results.json --format html --output report.html1. Quick Web Application Assessment
ops
# Press 's' for Scanner
# Enter target: https://example.com
# Select: Web Scanner, DNS Enumerator, Gobuster, Nikto
# Press Ctrl+S to start2. Network Penetration Test
ops scan --target 192.168.1.0/24 \
--module network_mapper,nmap_tool,vuln_scanner \
--output network_assessment.json3. Cloud Security Audit
ops scan --target aws-prod \
--module cloud_hunter \
--config aws_config.yamlPurpose: Network discovery and topology mapping Features:
- Fast host discovery
- Port scanning (TCP/UDP)
- Service detection
- OS fingerprinting
- Network visualization
Purpose: Multi-cloud security assessment Providers: AWS, Azure, GCP Features:
- IAM policy analysis
- Storage bucket enumeration
- Security group audit
- Compliance checks
Purpose: Web application vulnerability detection Features:
- SSL/TLS validation
- Security header analysis
- CORS policy check
- Cookie security
Purpose: Directory/DNS brute forcing Features:
- Directory enumeration
- DNS subdomain discovery
- Custom wordlists
Purpose: SQL injection detection Features:
- Automated SQLi detection
- Database fingerprinting
- Multiple injection techniques
Purpose: Web server scanning Features:
- 6700+ vulnerability checks
- Misconfiguration detection
Purpose: Advanced network scanning Features:
- SYN/Connect/UDP scans
- NSE script engine
- OS detection
OPS includes an intelligent correlation engine that:
- Discovers Attack Paths - Links findings across modules
- Risk Prioritization - Calculates combined risk scores
- Attack Surface Mapping - Visualizes entry points
Example Attack Path:
Open SSH Port β Weak Version β Default Credentials β Privilege Escalation
This tool is designed for authorized security testing only.
- β Obtain proper written authorization before testing
- β Use only on systems you own or have permission to test
- β Comply with all applicable laws
- β Never use for malicious purposes
Unauthorized use may be illegal.
overpowered-pentest-suite/
βββ core/ # Core framework
βββ modules/ # Scanning modules
βββ tui/ # Text User Interface
βββ reports/ # Report generation
βββ ops # Main launcher
βββ requirements.txt # Dependencies
- Fork the repository
- Create a feature branch
- Commit your changes
- Open a Pull Request
- Installation Guide - Detailed setup instructions
- Troubleshooting Guide - Fix common issues β NEW
- Quick Start - 5-minute getting started guide
- TUI Guide - Text User Interface usage
- TUI Improvements - UI enhancements
- Installation issues? See TROUBLESHOOTING.md
- Dependency problems? Run
python3 check_dependencies.py - Usage questions? Check the documentation above
Built with:
MIT License - see LICENSE file
Made with β€οΈ for the security community
β Star this repo if you find it useful!