A powerful, automated script that installs and configures 300+ offensive security tools across 20+ categories (recon, exploitation, post-exploitation, red teaming, etc.). Features parallel installations, GitHub API integration, dependency management, and isolated Python environments for clean tool setups.
A comprehensive, automated installer for offensive security tools with parallel installation capabilities, credential management, and robust error handling.
- Automated Tool Installation: 300+ security tools organized by category
- Parallel Installations: Up to 5 concurrent installations (configurable)
- Credential Management: GitHub credentials stored securely for authenticated access
- Virtual Environments: Automatic Python virtual environment creation
- Comprehensive Logging: Detailed installation logs with timestamps
- System Checks: Pre-installation dependency and resource verification
- Error Handling: Graceful failure and continuation on errors
- Progress Tracking: Real-time progress with time estimates
Category | Description | Example Tools |
---|---|---|
Reconnaissance | Information gathering | Amass, Sublist3r, theHarvester |
Vulnerability Analysis | Vulnerability scanners | Nessus, OpenVAS, Trivy |
Exploitation | Exploit frameworks | Metasploit, SQLMap, CrackMapExec |
Post-Exploitation | Post-exploitation tools | BloodHound, Mimikatz, Sliver |
Credential Access | Password cracking | Hashcat, John, Hydra |
Web Testing | Web application tools | Burp Suite, ZAP, Nuclei |
Red Teaming | Red team infrastructure | Cobalt Strike, Mythic, Caldera |
- Linux/macOS (Windows via WSL2)
- Bash 4.0+
- Python 3.6+
- Git
- curl/wget
- 10GB+ free disk space
- Download the offsec-toolkit:
curl -L -o offsec-toolkit.sh https://raw.githubusercontent.com/offsec-toolkit/offsec-toolkit.sh
chmod +x offsec-toolkit.sh
- Create a token with:
- No special permissions required (access public repos only)
- Token can be generated at: https://github.com/settings/tokens
- The token will be stored encrypted at:
~/.offsec_github_creds
- Basic Usage
./offsec-toolkit.sh
- Custom Installation Directory
export TOOLS_DIR="/custom/path" && ./offsec-toolkit.sh
-Max Parallel Installations
export MAX_PARALLEL_INSTALLS=3 && ./offsec-toolkit.sh
- Skip Credential Prompt
GITHUB_USER="yourusername" GITHUB_TOKEN="yourtoken" ./offsec-toolkit.sh
- System Checks
Verify dependencies Check disk space Test internet connectivity
- Environment Setup
Create tool directories Set up virtual environments Configure PATH
- Tool Installation
Parallel downloads Dependency resolution Custom install scripts
- Reporting
Success/failure summary Installation times Log file generation
- Error Handling
The script handles:
Failed downloads
Missing dependencies
Authentication errors
Network issues
Disk space errors
Errors are logged to: ~/Tools/install.log
Component | Details |
---|---|
Language | Bash 4.0+ |
Configuration | Environment variables |
Credential Storage | Encrypted local file |
Parallel Processing | Background jobs with PID tracking |
Logging | Tee to console and file |
Exit Codes | 0 (Success), 1-255 (Error codes) |
-
Common Issues:
-
Permission denied:
chmod +x offsec-toolkit.sh
- Unexpected end of file:
dos2unix offsec-toolkit.sh
- Missing dependencies:
sudo apt install git curl python3 pip3
- View logs:
cat ~/Tools/install.log
GPL-3.0 License - See LICENSE for details.
Zubair Usman (Mr.Pop3y3)
GitHub: @zus3c
Twitter: @zus3cu
LinkedIn: @zus3c
WhatsApp channel: https://whatsapp.com/channel/0029VahEpDoGZNCjNV0vXF1B