An automated, parallelized installer script that configures over 300 offensive security tools across multiple categories with robust dependency and credential management.
A powerful, automated script that installs and configures 300+ offensive security tools across 20+ categories (recon, exploitation, post-exploitation, red teaming, etc.). Features parallel installations, GitHub API integration, dependency management, and isolated Python environments for clean tool setups.
This tool is designed for penetration testers and red teamers who need a streamlined, automated way to install and manage a comprehensive suite of offensive security tools. It simplifies setup by handling dependencies, environment isolation, and parallel installations, saving time and reducing configuration errors.
Requires Linux/macOS or Windows with WSL2, Bash 4.0+, Python 3.6+, Git, and curl/wget installed. At least 10GB of free disk space is recommended. Users should generate a GitHub token with no special permissions for authenticated access, which is stored encrypted locally. The script handles errors gracefully and logs detailed installation information for troubleshooting.
Download the offsec-toolkit script: curl -L -o offsec-toolkit.sh https://raw.githubusercontent.com/offsec-toolkit/offsec-toolkit.sh
Make the script executable: chmod +x offsec-toolkit.sh
./offsec-toolkit.sh
Run the installer with default settings to install all tools.
export TOOLS_DIR="/custom/path" && ./offsec-toolkit.sh
Run the installer specifying a custom installation directory.
export MAX_PARALLEL_INSTALLS=3 && ./offsec-toolkit.sh
Run the installer with a maximum of 3 concurrent installations.
GITHUB_USER="yourusername" GITHUB_TOKEN="yourtoken" ./offsec-toolkit.sh
Run the installer using pre-set GitHub credentials to skip the credential prompt.