Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
☆1,215Feb 3, 2025Updated last year
Alternatives and similar repositories for kubesploit
Users that are interested in kubesploit are comparing it to the libraries listed below
Sorting:
- Peirates - Kubernetes Penetration Testing tool☆1,424Jan 20, 2026Updated last month
- A tool to scan Kubernetes cluster for risky permissions☆1,412May 25, 2025Updated 9 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,504Apr 17, 2025Updated 10 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,874Aug 18, 2023Updated 2 years ago
- A Blazing fast Security Auditing tool for Kubernetes☆1,006Apr 6, 2024Updated last year
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- Hide your payload in DNS☆615May 3, 2023Updated 2 years ago
- Hunt for security weaknesses in Kubernetes clusters☆5,004Mar 19, 2024Updated last year
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,439Dec 18, 2022Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,620Jul 18, 2024Updated last year
- A collaborative, multi-platform, red teaming framework☆4,318Feb 19, 2026Updated last week
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,151Apr 17, 2025Updated 10 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,266Feb 13, 2026Updated 2 weeks ago
- Red Team K8S Adversary Emulation Based on kubectl☆826May 28, 2021Updated 4 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆992Oct 7, 2022Updated 3 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,727Jan 16, 2026Updated last month
- ☆576Jul 12, 2025Updated 7 months ago
- A toolkit to attack Office365☆1,117Nov 6, 2020Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,167Sep 29, 2021Updated 4 years ago
- Azure Security Resources and Notes☆1,711Feb 17, 2026Updated last week
- Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport☆1,689Updated this week
- Adversary Emulation Framework☆10,717Feb 23, 2026Updated last week
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- A client for kubelet☆870Aug 6, 2025Updated 6 months ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,562Updated this week
- The swiss army knife of LSASS dumping☆2,072Sep 17, 2024Updated last year
- ☆2,168Feb 21, 2023Updated 3 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,073Updated this week
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,427Nov 18, 2025Updated 3 months ago
- AV/EDR evasion via direct system calls.☆1,793Sep 3, 2022Updated 3 years ago
- Open-Source Shellcode & PE Packer☆2,069Feb 3, 2024Updated 2 years ago
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆301Aug 30, 2021Updated 4 years ago
- Open source pre-operation C2 server based on python and powershell☆762Jul 6, 2021Updated 4 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆232Jun 10, 2022Updated 3 years ago
- Template-Driven AV/EDR Evasion Framework☆1,779Nov 3, 2023Updated 2 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,201Apr 16, 2025Updated 10 months ago
- A tool to kill antimalware protected processes☆1,506Jun 19, 2021Updated 4 years ago