π΄ββ οΈ Hacking Guides, Demos and Proof-of-Concepts π₯·
β220Sep 4, 2025Updated 7 months ago
Alternatives and similar repositories for sploitcraft
Users that are interested in sploitcraft are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux post exploitation tool for info gathering and exfiltration π§π‘πβ94Nov 13, 2025Updated 5 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.β36Aug 20, 2023Updated 2 years ago
- Purple-team telemetry & simulation toolkit.β113Dec 16, 2025Updated 4 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β62Aug 19, 2024Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkitβ165Dec 7, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automated Active Directory lab running on Proxmoxβ88Aug 8, 2025Updated 8 months ago
- Presentaciones de congresosβ54Jun 21, 2024Updated last year
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanceβ¦β576May 22, 2025Updated 11 months ago
- an Improoved Version of 0xNinjaCycloneΒ΄s EarlyCascade Codeβ22Feb 20, 2025Updated last year
- Docker container for running CobaltStrike 4.10β38Sep 18, 2024Updated last year
- Red Team Coin for crypto-mining operations.β24Mar 1, 2026Updated 2 months ago
- Source code and examples for PassiveAggressionβ64Jun 6, 2024Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data β¦β154Dec 26, 2025Updated 4 months ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboardβ13Mar 11, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders β¦β102Mar 27, 2025Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.β151Jun 5, 2025Updated 10 months ago
- hiding in plain sight: part 2β46Jul 11, 2024Updated last year
- Advanced Penetration Testing Framework | Powered by Bashβ32Oct 31, 2024Updated last year
- A C# Tool to gather information about email breachesβ16Dec 21, 2023Updated 2 years ago
- β18Feb 29, 2024Updated 2 years ago
- β57Jul 8, 2025Updated 9 months ago
- Indirect Syscall with TartarusGate Approach in Goβ136Jul 8, 2025Updated 9 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!β552May 9, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Monarch - The Adversary Emulation Toolkitβ64Jan 7, 2025Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detectionβ14Nov 1, 2024Updated last year
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occurβ10Feb 8, 2022Updated 4 years ago
- Sleep obfuscationβ274Dec 13, 2024Updated last year
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitationβ401Jul 23, 2025Updated 9 months ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!β1,864Updated this week
- β143May 22, 2024Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.β41Nov 12, 2023Updated 2 years ago
- A PoC for Early Cascade process injection technique.β216Jan 30, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.β212Feb 7, 2026Updated 2 months ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)β705May 7, 2025Updated 11 months ago
- A BloodHound collector for Microsoft Configuration Managerβ399Jul 7, 2025Updated 9 months ago
- PoC code of Shade BIOS (stripped) presented at Black Hat USA 2025β66Jul 16, 2025Updated 9 months ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.β41Feb 20, 2026Updated 2 months ago
- β53Oct 29, 2024Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.β133Oct 4, 2024Updated last year