One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
-
Updated
Apr 12, 2026 - Python
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
A high performance offensive security tool for reconnaissance and vulnerability scanning
Automated NoSQL database enumeration and web application exploitation tool.
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
🆕 The Multi-Tool Web Vulnerability Scanner.
⛔ offsec batteries included
This Script will help you to gather information about your victim or friend.
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
C2/post-exploitation framework
KawaiiGPT — Open-source LLM gateway accessing DeepSeek, Gemini, and Kimi-K2 through reverse-engineered Pollinations API with no API keys required, built-in prompt injection capabilities for security research, Termux/Linux native support, and Rich console interface
MCP server for AI-driven security pipelines
WiFi Penetration Testing Guide
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
swiss army knife for hackers
A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Add a description, image, and links to the offensive-security topic page so that developers can more easily learn about it.
To associate your repository with the offensive-security topic, visit your repo's landing page and select "manage topics."