Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
☆1,220Feb 3, 2025Updated last year
Alternatives and similar repositories for kubesploit
Users that are interested in kubesploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to scan Kubernetes cluster for risky permissions☆1,424May 25, 2025Updated 11 months ago
- Peirates - Kubernetes Penetration Testing tool☆1,446Apr 16, 2026Updated last month
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,541Apr 17, 2025Updated last year
- A Blazing fast Security Auditing tool for Kubernetes☆1,004Apr 6, 2024Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A client for kubelet☆891Aug 6, 2025Updated 9 months ago
- Self-developed tools for Lateral Movement/Code Execution☆722Aug 17, 2021Updated 4 years ago
- Hide your payload in DNS☆613May 3, 2023Updated 3 years ago
- .NET Project for Attacking vCenter☆559Nov 11, 2021Updated 4 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,456Dec 18, 2022Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,687Jul 18, 2024Updated last year
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,162Apr 17, 2025Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆994Oct 7, 2022Updated 3 years ago
- A collaborative, multi-platform, red teaming framework☆4,474Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Granular, Actionable Adversary Emulation for the Cloud☆2,319May 13, 2026Updated last week
- ☆575Jul 12, 2025Updated 10 months ago
- Red Team K8S Adversary Emulation Based on kubectl☆828May 28, 2021Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,172Sep 29, 2021Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,759Jan 16, 2026Updated 4 months ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,660May 1, 2026Updated 2 weeks ago
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆299Aug 30, 2021Updated 4 years ago
- A toolkit to attack Office365☆1,122Nov 6, 2020Updated 5 years ago
- Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport☆1,703May 2, 2026Updated 2 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Azure Security Resources and Notes☆1,747Feb 17, 2026Updated 3 months ago
- Adversary Emulation Framework☆11,206May 7, 2026Updated 2 weeks ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆298Aug 18, 2023Updated 2 years ago
- NTLM relaying for Windows made easy☆582Apr 25, 2023Updated 3 years ago
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,637Apr 16, 2026Updated last month
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 3 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,194Updated this week
- The swiss army knife of LSASS dumping☆2,114Sep 17, 2024Updated last year
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,400Dec 16, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆2,187Apr 3, 2026Updated last month
- Open-Source Shellcode & PE Packer☆2,105Feb 3, 2024Updated 2 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆234Jun 10, 2022Updated 3 years ago
- Template-Driven AV/EDR Evasion Framework☆1,798Nov 3, 2023Updated 2 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,210Apr 16, 2025Updated last year
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆921Aug 19, 2021Updated 4 years ago
- ☆671Nov 17, 2021Updated 4 years ago