☆390May 16, 2026Updated this week
Alternatives and similar repositories for krakenhashes
Users that are interested in krakenhashes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 5 months ago
- MDE/MDI Defender setup for Ludus☆57Mar 14, 2026Updated 2 months ago
- ☆219Dec 17, 2025Updated 5 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 3 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆322Dec 29, 2025Updated 4 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Your template-based BloodHound terminal companion tool☆450Jan 21, 2026Updated 3 months ago
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆207Feb 11, 2026Updated 3 months ago
- Dominate the domain. Relay to royalty.☆306Mar 31, 2026Updated last month
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 9 months ago
- The Azure Execution Tool☆156Feb 6, 2026Updated 3 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆133Feb 17, 2026Updated 3 months ago
- A TUI for Active Directory collection.☆137Mar 17, 2026Updated 2 months ago
- Claude MCP server to perform analysis on ROADrecon data☆50Mar 30, 2025Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆167Apr 17, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Initial Access and Post-Exploitation Tool for Entra ID and M365 with a browser-based GUI☆1,290May 4, 2026Updated 2 weeks ago
- Bunch of BOF files☆41Jun 30, 2025Updated 10 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆565Oct 3, 2025Updated 7 months ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 10 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆70Jan 10, 2025Updated last year
- Library of BOFs to interact with SQL servers☆236Dec 3, 2025Updated 5 months ago
- Convert your shellcode into an ASCII string☆129Jun 27, 2025Updated 10 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆139Dec 7, 2025Updated 5 months ago
- ☆85Feb 12, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Python POC for CRED1 over SOCKS5☆167Oct 5, 2024Updated last year
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆444May 29, 2024Updated last year
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆175May 8, 2026Updated last week
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆175Sep 3, 2025Updated 8 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,032Apr 17, 2026Updated last month
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆443Jun 27, 2025Updated 10 months ago
- Pass the Hash to a named pipe for token Impersonation☆310Nov 29, 2023Updated 2 years ago
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆148Updated this week
- Weaponizing DCOM for NTLM Authentication Coercions☆210Nov 4, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆438Mar 2, 2025Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆39Jan 2, 2025Updated last year
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆596Mar 19, 2024Updated 2 years ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 9 months ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- COFF file (BOF) for managing Kerberos tickets.☆324Jul 2, 2023Updated 2 years ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆403Jan 14, 2026Updated 4 months ago