Adversary Emulation Framework
☆10,958Apr 2, 2026Updated this week
Alternatives and similar repositories for sliver
Users that are interested in sliver are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Havoc Framework☆8,257Dec 18, 2025Updated 3 months ago
- A collaborative, multi-platform, red teaming framework☆4,399Mar 30, 2026Updated last week
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,656Jul 18, 2024Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,526Apr 17, 2025Updated 11 months ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,524Jul 8, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,882Aug 18, 2023Updated 2 years ago
- Trying to tame the three-headed dog.☆4,952Nov 14, 2025Updated 4 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,093Feb 25, 2026Updated last month
- Impacket is a collection of Python classes for working with network protocols.☆15,593Mar 30, 2026Updated last week
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,098Nov 20, 2025Updated 4 months ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,538Jan 10, 2025Updated last year
- Six Degrees of Domain Admin☆10,551Mar 2, 2026Updated last month
- A swiss army knife for pentesting networks☆9,112Dec 6, 2023Updated 2 years ago
- generate CobaltStrike's cross-platform payload☆2,554Nov 20, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,799Updated this week
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,562Aug 20, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,771Mar 30, 2026Updated last week
- The swiss army knife of LSASS dumping☆2,083Sep 17, 2024Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,614Updated this week
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,744Jan 16, 2026Updated 2 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆3,451Feb 28, 2026Updated last month
- Open-Source Shellcode & PE Packer☆2,084Feb 3, 2024Updated 2 years ago
- The Network Execution Tool☆5,393Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cobalt Strike Malleable C2 Design and Reference Guide☆1,749Dec 13, 2023Updated 2 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,414Mar 16, 2026Updated 3 weeks ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,424Feb 15, 2026Updated last month
- game of active directory☆7,651Mar 12, 2026Updated 3 weeks ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,170Sep 29, 2021Updated 4 years ago
- ☆1,530Aug 11, 2023Updated 2 years ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,836Updated this week
- List of Awesome CobaltStrike Resources☆4,400Sep 20, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,587Dec 31, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,220Jan 5, 2026Updated 3 months ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,617Jul 10, 2023Updated 2 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,335Dec 6, 2023Updated 2 years ago
- Mimikatz implementation in pure Python☆3,270Jan 2, 2026Updated 3 months ago
- Automated Adversary Emulation Platform☆6,868Updated this week
- The ultimate WinRM shell for hacking/pentesting☆5,315Mar 10, 2026Updated 3 weeks ago
- Defeating Windows User Account Control☆7,469Feb 17, 2026Updated last month