☆383Apr 13, 2026Updated last week
Alternatives and similar repositories for krakenhashes
Users that are interested in krakenhashes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 4 months ago
- MDE/MDI Defender setup for Ludus☆55Mar 14, 2026Updated last month
- InfraGuard is a Command & Control Redirection Proxy and Manager which protects your Red Team Infrastructure against threat attribution☆133Apr 6, 2026Updated 2 weeks ago
- ☆216Dec 17, 2025Updated 4 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Enhance Your Active Directory Password Spraying with User Intelligence.☆320Dec 29, 2025Updated 3 months ago
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆202Feb 11, 2026Updated 2 months ago
- Your template-based BloodHound terminal companion tool☆447Jan 21, 2026Updated 2 months ago
- Dominate the domain. Relay to royalty.☆283Mar 31, 2026Updated 2 weeks ago
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 8 months ago
- The Azure Execution Tool☆154Feb 6, 2026Updated 2 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆129Feb 17, 2026Updated 2 months ago
- A TUI for Active Directory collection.☆135Mar 17, 2026Updated last month
- Claude MCP server to perform analysis on ROADrecon data☆50Mar 30, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tool for Active Directory Certificate Services enumeration and abuse☆166Apr 17, 2025Updated last year
- Initial Access and Post-Exploitation Tool for Entra ID and M365 with a browser-based GUI☆1,269Apr 13, 2026Updated last week
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆555Oct 3, 2025Updated 6 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆66Jan 10, 2025Updated last year
- Bunch of BOF files☆41Jun 30, 2025Updated 9 months ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 9 months ago
- Library of BOFs to interact with SQL servers☆231Dec 3, 2025Updated 4 months ago
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆135Updated this week
- Convert your shellcode into an ASCII string☆128Jun 27, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆139Dec 7, 2025Updated 4 months ago
- ☆84Feb 12, 2026Updated 2 months ago
- A Python POC for CRED1 over SOCKS5☆166Oct 5, 2024Updated last year
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆442May 29, 2024Updated last year
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆175Sep 3, 2025Updated 7 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆439Jun 27, 2025Updated 9 months ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆171Jan 12, 2026Updated 3 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,027Updated this week
- Weaponizing DCOM for NTLM Authentication Coercions☆206Nov 4, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆437Mar 2, 2025Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆38Jan 2, 2025Updated last year
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆590Mar 19, 2024Updated 2 years ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 8 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆364Apr 8, 2026Updated last week
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- COFF file (BOF) for managing Kerberos tickets.☆322Jul 2, 2023Updated 2 years ago