Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
☆1,218Feb 3, 2025Updated last year
Alternatives and similar repositories for kubesploit
Users that are interested in kubesploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to scan Kubernetes cluster for risky permissions☆1,418May 25, 2025Updated 10 months ago
- Peirates - Kubernetes Penetration Testing tool☆1,431Jan 20, 2026Updated 2 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,533Apr 17, 2025Updated 11 months ago
- A Blazing fast Security Auditing tool for Kubernetes☆1,005Apr 6, 2024Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,879Aug 18, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A client for kubelet☆886Aug 6, 2025Updated 8 months ago
- Self-developed tools for Lateral Movement/Code Execution☆721Aug 17, 2021Updated 4 years ago
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- .NET Project for Attacking vCenter☆557Nov 11, 2021Updated 4 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,455Dec 18, 2022Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,656Jul 18, 2024Updated last year
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,157Apr 17, 2025Updated 11 months ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆992Oct 7, 2022Updated 3 years ago
- A collaborative, multi-platform, red teaming framework☆4,399Mar 30, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Granular, Actionable Adversary Emulation for the Cloud☆2,289Apr 2, 2026Updated last week
- ☆576Jul 12, 2025Updated 8 months ago
- Red Team K8S Adversary Emulation Based on kubectl☆828May 28, 2021Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,170Sep 29, 2021Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,744Jan 16, 2026Updated 2 months ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,611Feb 23, 2026Updated last month
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆301Aug 30, 2021Updated 4 years ago
- A toolkit to attack Office365☆1,118Nov 6, 2020Updated 5 years ago
- Azure Security Resources and Notes☆1,730Feb 17, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport☆1,700Mar 21, 2026Updated 2 weeks ago
- Adversary Emulation Framework☆10,958Apr 2, 2026Updated last week
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- NTLM relaying for Windows made easy