Adversary Emulation Framework
☆11,023Apr 10, 2026Updated last week
Alternatives and similar repositories for sliver
Users that are interested in sliver are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Havoc Framework☆8,274Dec 18, 2025Updated 4 months ago
- A collaborative, multi-platform, red teaming framework☆4,409Apr 10, 2026Updated last week
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,664Jul 18, 2024Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,530Apr 17, 2025Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,547Jul 8, 2025Updated 9 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,878Aug 18, 2023Updated 2 years ago
- Trying to tame the three-headed dog.☆4,971Nov 14, 2025Updated 5 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,116Apr 5, 2026Updated 2 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆15,631Apr 9, 2026Updated last week
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,099Nov 20, 2025Updated 4 months ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,541Jan 10, 2025Updated last year
- Six Degrees of Domain Admin☆10,537Mar 2, 2026Updated last month
- A swiss army knife for pentesting networks☆9,124Dec 6, 2023Updated 2 years ago
- generate CobaltStrike's cross-platform payload☆2,554Nov 20, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,896Updated this week
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,563Aug 20, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,793Apr 6, 2026Updated last week
- The swiss army knife of LSASS dumping☆2,088Sep 17, 2024Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,681Updated this week
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,746Jan 16, 2026Updated 3 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆3,465Feb 28, 2026Updated last month
- The Network Execution Tool☆5,437Updated this week
- Open-Source Shellcode & PE Packer☆2,087Feb 3, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cobalt Strike Malleable C2 Design and Reference Guide☆1,752Dec 13, 2023Updated 2 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,450Mar 16, 2026Updated last month
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,459Feb 15, 2026Updated 2 months ago
- game of active directory☆7,691Mar 12, 2026Updated last month
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,172Sep 29, 2021Updated 4 years ago
- ☆1,530Aug 11, 2023Updated 2 years ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,850Updated this week
- List of Awesome CobaltStrike Resources☆4,406Sep 20, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,588Dec 31, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,223Jan 5, 2026Updated 3 months ago
- Mimikatz implementation in pure Python☆3,291Apr 9, 2026Updated last week
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,335Dec 6, 2023Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,619Jul 10, 2023Updated 2 years ago
- Automated Adversary Emulation Platform☆6,900Updated this week
- The ultimate WinRM shell for hacking/pentesting☆5,339Mar 10, 2026Updated last month
- Defeating Windows User Account Control☆7,502Feb 17, 2026Updated 2 months ago