☆351Mar 2, 2026Updated this week
Alternatives and similar repositories for krakenhashes
Users that are interested in krakenhashes are comparing it to the libraries listed below
Sorting:
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Dec 7, 2025Updated 3 months ago
- ☆207Dec 17, 2025Updated 2 months ago
- A TUI for Active Directory collection.☆112Feb 17, 2026Updated 2 weeks ago
- Simulation and red team Phishing Framework☆183Updated this week
- Enhance Your Active Directory Password Spraying with User Intelligence.☆313Dec 29, 2025Updated 2 months ago
- Your template-based BloodHound terminal companion tool☆447Jan 21, 2026Updated last month
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- ☆50Jun 4, 2025Updated 9 months ago
- MDE/MDI Defender setup for Ludus☆38Updated this week
- A cmake template for crystal palace☆39Dec 20, 2025Updated 2 months ago
- adws enumeration bof☆169Feb 16, 2026Updated 2 weeks ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆134Aug 23, 2025Updated 6 months ago
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 8 months ago
- Convert your shellcode into an ASCII string☆128Jun 27, 2025Updated 8 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆180Feb 11, 2026Updated 3 weeks ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆197Nov 4, 2025Updated 4 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,019Feb 1, 2026Updated last month
- Privilege Escalation using Passwd - April Fools prank☆36Apr 3, 2025Updated 11 months ago
- ☆48Nov 26, 2025Updated 3 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆262Feb 21, 2025Updated last year
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆586Mar 19, 2024Updated last year
- Dump Kerberos tickets☆45Aug 4, 2025Updated 7 months ago
- ☆18Feb 29, 2024Updated 2 years ago
- BlackRecon is an automated reconnaissance tool designed for ethical hacking and security assessments. It enumerates subdomains, resolves …☆20Apr 27, 2025Updated 10 months ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 11 months ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆441May 29, 2024Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Chrome browser extension-based Command & Control☆239Jul 2, 2025Updated 8 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Jun 9, 2024Updated last year
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆502Oct 3, 2025Updated 5 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,033Dec 31, 2025Updated 2 months ago
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆111Feb 15, 2026Updated 2 weeks ago
- ☆43Jul 17, 2025Updated 7 months ago