A scalable pentesting platform
☆11Feb 6, 2026Updated last month
Alternatives and similar repositories for kraken-project
Users that are interested in kraken-project are comparing it to the libraries listed below
Sorting:
- A multi-language ORM written in pure rust.☆30Feb 17, 2026Updated 2 weeks ago
- D frontend for rorm☆17Aug 27, 2025Updated 6 months ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- Comprehensive reverse analysis and exposure of CoreCLR internals from D.☆11Aug 14, 2024Updated last year
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- Pure D implementation of SHA-3 (Keccak-f[1600,24]) + DUB package☆12Sep 15, 2025Updated 5 months ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Takes a screenshot every time you die ingame☆10Feb 5, 2023Updated 3 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- Instant feature rich terminal image viewer☆13Apr 4, 2024Updated last year
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 8 months ago
- ☆15May 30, 2025Updated 9 months ago
- A lightweight client for the ACME protocol written in the D language.☆11Oct 5, 2025Updated 5 months ago
- This is a simple python binding of Stag Fiducial Marker Detection System☆12Mar 7, 2022Updated 4 years ago
- ☆15Oct 29, 2024Updated last year
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- D language binding of RE2 regex engine.☆14Aug 6, 2023Updated 2 years ago
- My neovim configuration☆11Feb 10, 2026Updated 3 weeks ago
- Moved to https://codeberg.org/KaOS/live-uefi☆12Nov 15, 2024Updated last year
- Distributed hash-table node☆12Oct 2, 2023Updated 2 years ago
- Scripts aiding penetration testing of Splunk Enterprise systems☆10Jan 29, 2019Updated 7 years ago
- barcodes☆11Oct 27, 2020Updated 5 years ago
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- Cracking Passwords with Neural Networks☆11Nov 18, 2020Updated 5 years ago
- ☆10Jun 26, 2024Updated last year
- ☆10Apr 26, 2024Updated last year
- A mesh system for adapting multiple large language models.☆11Mar 20, 2024Updated last year
- Atom syntax highlighting and snippets for the D programming language.☆10Aug 13, 2017Updated 8 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- Rocker: Robustness Checker☆10Nov 21, 2024Updated last year
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 5 months ago
- LDAP Plugin for OpenMediaVault☆12Mar 31, 2025Updated 11 months ago
- simple HTTP(S) server for receiving webhooks and running commands☆16Feb 4, 2026Updated last month