bashcrumb

Lightweight, customizable enumeration script to aid in time-saving when participating in hacking labs or OSCP exam.

31
6
100% credibility
Found Feb 17, 2026 at 22 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

An automated script that runs various network and service discovery checks to help with penetration testing preparation for the OSCP exam.

How It Works

1
🔍 Discover the Helper

While preparing for your security exam, you find this handy tool that automates checking practice networks so you can focus on the fun part: breaking in.

2
🛠️ Prepare Your Computer

You quickly set up the needed scanning programs on your Kali machine by running a simple preparation script.

3
🚀 Launch the Scan

You simply tell the tool the address of a practice machine, choose options like quick mode if needed, and it starts exploring automatically.

4
Watch It Work

Sit back as it checks for open services like web pages, file shares, and databases, organizing everything into neat folders.

5
📁 Explore the Results

Dive into clearly labeled folders to see detailed findings from web checks, shares, and more.

📋 Get Your Summary Report

Celebrate with a tidy overview report of open doors and next steps, ready to jump into exploitation.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 22 to 31 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is offsec-enum?

offsec-enum is a lightweight, customizable Python enumeration script that automates port scanning and service discovery for hacking labs and OSCP exams. Run it with a simple CLI like `sudo python3 offsec_enum.py 10.10.10.10 -q` to kick off nmap scans, web enum via nikto and gobuster, SMB checks with enum4linux, and more, spitting out organized output directories plus a markdown REPORT.md summary. It saves hours of manual tedium, letting you background multiple targets while focusing on exploits.

Why is it gaining traction?

This stands out as a fast, customizable lightweight enum tool tailored for exam pressure—quick mode limits to top 10k ports, custom port ranges, and easy tweaks for your wordlists or timeouts. Unlike bloated alternatives, it delivers structured results for web, SMB, FTP, and DB services without overwhelming your Kali setup, making it a go-to aid for time-crunched pentesters. The OSCP-specific workflow tips in the docs hook users prepping for high-stakes hacking scenarios.

Who should use this?

OSCP candidates grinding HTB or Proving Grounds machines, red teamers enumerating lab targets in parallel, or junior pentesters needing a lightweight customizable enumeration starter. It's ideal for anyone running Kali who wants automated nmap-driven recon on web, SMB, and common services during timed exams or CTF-like drills.

Verdict

Grab it if you're OSCP-bound—solid docs and CLI make it usable out of the box, despite low maturity with 19 stars and 1.0% credibility score. Test on labs first; it's raw but effective for enumeration aid, not a production suite.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.