Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
☆1,219Feb 3, 2025Updated last year
Alternatives and similar repositories for kubesploit
Users that are interested in kubesploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to scan Kubernetes cluster for risky permissions☆1,421May 25, 2025Updated 11 months ago
- Peirates - Kubernetes Penetration Testing tool☆1,443Apr 16, 2026Updated 2 weeks ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,533Apr 17, 2025Updated last year
- A Blazing fast Security Auditing tool for Kubernetes☆1,005Apr 6, 2024Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A client for kubelet☆890Aug 6, 2025Updated 8 months ago
- Self-developed tools for Lateral Movement/Code Execution☆721Aug 17, 2021Updated 4 years ago
- Hide your payload in DNS☆613May 3, 2023Updated 2 years ago
- .NET Project for Attacking vCenter☆559Nov 11, 2021Updated 4 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,456Dec 18, 2022Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,675Jul 18, 2024Updated last year
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,159Apr 17, 2025Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆993Oct 7, 2022Updated 3 years ago
- A collaborative, multi-platform, red teaming framework☆4,432Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Granular, Actionable Adversary Emulation for the Cloud☆2,301Apr 23, 2026Updated last week
- ☆575Jul 12, 2025Updated 9 months ago
- Red Team K8S Adversary Emulation Based on kubectl☆829May 28, 2021Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,173Sep 29, 2021Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,755Jan 16, 2026Updated 3 months ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,635Apr 13, 2026Updated 2 weeks ago
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆302Aug 30, 2021Updated 4 years ago
- A toolkit to attack Office365☆1,120Nov 6, 2020Updated 5 years ago
- Azure Security Resources and Notes☆1,738Feb 17, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport☆1,702Updated this week
- Adversary Emulation Framework☆11,081Apr 22, 2026Updated last week
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆298Aug 18, 2023Updated 2 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 3 years ago
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,609Apr 16, 2026Updated 2 weeks ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 3 years ago
- The swiss army knife of LSASS dumping☆2,094Sep 17, 2024Updated last year
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,166Updated this week
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,400Dec 16, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆2,182Apr 3, 2026Updated 3 weeks ago
- Open-Source Shellcode & PE Packer☆2,094Feb 3, 2024Updated 2 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆234Jun 10, 2022Updated 3 years ago
- Template-Driven AV/EDR Evasion Framework☆1,794Nov 3, 2023Updated 2 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,205Apr 16, 2025Updated last year
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆921Aug 19, 2021Updated 4 years ago
- ☆670Nov 17, 2021Updated 4 years ago