π΄ββ οΈ Hacking Guides, Demos and Proof-of-Concepts π₯·
β221Sep 4, 2025Updated 8 months ago
Alternatives and similar repositories for sploitcraft
Users that are interested in sploitcraft are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π‘οΈ π π₯·π» Everything CyberSecurity Related π΄ββ οΈ πΎ π΅πΎβ26Jun 23, 2024Updated last year
- Projects and Proof of Concepts regarding the cloud native world βοΈ πβ19Dec 13, 2024Updated last year
- A lightweight kubernetes operator to test cluster resilience via chaos engineering π£ βΈοΈβ27Mar 13, 2025Updated last year
- Nostr Osint Tool π π ¦β25Dec 11, 2023Updated 2 years ago
- Get started with the Bitcoin Lightningβ‘ Network the "hard" way πͺβ16Jan 2, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Pipeline for patching CVEs in container images ππ¦β21Feb 8, 2024Updated 2 years ago
- Linux post exploitation tool for info gathering and exfiltration π§π‘πβ98Nov 13, 2025Updated 6 months ago
- check for file differences in github repo folders π πβ18Nov 12, 2025Updated 6 months ago
- Mine Bitcoin Vanity Addresses βοΈπ °οΈπ ±οΈπ ΎοΈβ16Oct 26, 2024Updated last year
- Terraform script to start one or more ec2 monero-mining instances. βοΈ πͺ βοΈβ13Nov 11, 2022Updated 3 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.β36Aug 20, 2023Updated 2 years ago
- Purple-team telemetry & simulation toolkit.β113Dec 16, 2025Updated 5 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β62Aug 19, 2024Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkitβ165Dec 7, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automated Active Directory lab running on Proxmoxβ89Aug 8, 2025Updated 9 months ago
- Presentaciones de congresosβ54Jun 21, 2024Updated last year
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanceβ¦β576May 22, 2025Updated last year
- an Improoved Version of 0xNinjaCycloneΒ΄s EarlyCascade Codeβ22Feb 20, 2025Updated last year
- Docker container for running CobaltStrike 4.10β38Sep 18, 2024Updated last year
- Red Team Coin for crypto-mining operations.β24Mar 1, 2026Updated 2 months ago
- Source code and examples for PassiveAggressionβ64Jun 6, 2024Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data β¦β155Dec 26, 2025Updated 4 months ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboardβ13Mar 11, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders β¦β102Mar 27, 2025Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.β151Jun 5, 2025Updated 11 months ago
- hiding in plain sight: part 2β46Jul 11, 2024Updated last year
- A C# Tool to gather information about email breachesβ16Dec 21, 2023Updated 2 years ago
- β18Feb 29, 2024Updated 2 years ago
- β57Jul 8, 2025Updated 10 months ago
- Indirect Syscall with TartarusGate Approach in Goβ136Jul 8, 2025Updated 10 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!β555May 9, 2025Updated last year
- Monarch - The Adversary Emulation Toolkitβ64Jan 7, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detectionβ14Nov 1, 2024Updated last year
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occurβ10Feb 8, 2022Updated 4 years ago
- Sleep obfuscationβ276Dec 13, 2024Updated last year
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)β735May 7, 2025Updated last year
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitationβ401Jul 23, 2025Updated 9 months ago
- β143May 22, 2024Updated 2 years ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!β1,877Updated this week