Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
☆1,218Feb 3, 2025Updated last year
Alternatives and similar repositories for kubesploit
Users that are interested in kubesploit are comparing it to the libraries listed below
Sorting:
- A tool to scan Kubernetes cluster for risky permissions☆1,418May 25, 2025Updated 9 months ago
- Peirates - Kubernetes Penetration Testing tool☆1,429Jan 20, 2026Updated 2 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,518Apr 17, 2025Updated 11 months ago
- A Blazing fast Security Auditing tool for Kubernetes☆1,005Apr 6, 2024Updated last year
- Hunt for security weaknesses in Kubernetes clusters☆5,020Mar 19, 2024Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,880Aug 18, 2023Updated 2 years ago
- A client for kubelet☆880Aug 6, 2025Updated 7 months ago
- Self-developed tools for Lateral Movement/Code Execution☆719Aug 17, 2021Updated 4 years ago
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,451Dec 18, 2022Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,641Jul 18, 2024Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆991Oct 7, 2022Updated 3 years ago
- A collaborative, multi-platform, red teaming framework☆4,358Mar 12, 2026Updated last week
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,152Apr 17, 2025Updated 11 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,277Mar 12, 2026Updated last week
- ☆576Jul 12, 2025Updated 8 months ago
- Red Team K8S Adversary Emulation Based on kubectl☆826May 28, 2021Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,169Sep 29, 2021Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,735Jan 16, 2026Updated 2 months ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,583Feb 23, 2026Updated 3 weeks ago
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆301Aug 30, 2021Updated 4 years ago
- A toolkit to attack Office365☆1,116Nov 6, 2020Updated 5 years ago
- Azure Security Resources and Notes☆1,716Feb 17, 2026Updated last month
- Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport☆1,691Mar 8, 2026Updated 2 weeks ago
- Adversary Emulation Framework☆10,838Mar 15, 2026Updated last week
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,447Nov 18, 2025Updated 4 months ago
- NTLM relaying for Windows made easy☆581Apr 25, 2023Updated 2 years ago
- The swiss army knife of LSASS dumping☆2,081Sep 17, 2024Updated last year
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,097Updated this week
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,397Dec 16, 2021Updated 4 years ago
- ☆2,173Feb 21, 2023Updated 3 years ago
- Open-Source Shellcode & PE Packer☆2,080Feb 3, 2024Updated 2 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Jun 10, 2022Updated 3 years ago
- Template-Driven AV/EDR Evasion Framework☆1,786Nov 3, 2023Updated 2 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,199Apr 16, 2025Updated 11 months ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆921Aug 19, 2021Updated 4 years ago