Adversary Emulation Framework
☆11,081Apr 22, 2026Updated this week
Alternatives and similar repositories for sliver
Users that are interested in sliver are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Havoc Framework☆8,292Dec 18, 2025Updated 4 months ago
- A collaborative, multi-platform, red teaming framework☆4,432Updated this week
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,675Jul 18, 2024Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,530Apr 17, 2025Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,552Jul 8, 2025Updated 9 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,879Aug 18, 2023Updated 2 years ago
- Trying to tame the three-headed dog.☆4,980Nov 14, 2025Updated 5 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,122Apr 19, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.☆15,655Updated this week
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,105Nov 20, 2025Updated 5 months ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,556Jan 10, 2025Updated last year
- Six Degrees of Domain Admin☆10,529Mar 2, 2026Updated last month
- A swiss army knife for pentesting networks☆9,123Dec 6, 2023Updated 2 years ago
- generate CobaltStrike's cross-platform payload☆2,560Nov 20, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆28,094Updated this week
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,565Aug 20, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,860Updated this week
- The swiss army knife of LSASS dumping☆2,091Sep 17, 2024Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,729Updated this week
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,755Jan 16, 2026Updated 3 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆3,485Feb 28, 2026Updated 2 months ago
- The Network Execution Tool☆5,469Updated this week
- Open-Source Shellcode & PE Packer☆2,093Feb 3, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cobalt Strike Malleable C2 Design and Reference Guide☆1,752Dec 13, 2023Updated 2 years ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,479Feb 15, 2026Updated 2 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,471Mar 16, 2026Updated last month
- game of active directory☆7,726Mar 12, 2026Updated last month
- ☆1,531Aug 11, 2023Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,173Sep 29, 2021Updated 4 years ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,863Updated this week
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,229Updated this week
- List of Awesome CobaltStrike Resources☆4,414Sep 20, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,337Dec 6, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,593Dec 31, 2025Updated 3 months ago
- Mimikatz implementation in pure Python☆3,294Apr 9, 2026Updated 2 weeks ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,629Jul 10, 2023Updated 2 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,350Mar 10, 2026Updated last month
- Automated Adversary Emulation Platform☆6,919Updated this week
- Defeating Windows User Account Control☆7,523Feb 17, 2026Updated 2 months ago