0x9ef / golang-uacbypasserLinks
Windows UAC bypass techniques implemented and written in Go
☆213Updated 3 years ago
Alternatives and similar repositories for golang-uacbypasser
Users that are interested in golang-uacbypasser are comparing it to the libraries listed below
Sorting:
- Really stupid re-implementation of invoke-wmiexec☆217Updated 2 years ago
- Another Go Shellcode Loader using Windows APIs☆141Updated 3 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆190Updated 3 years ago
- Windows Defender ShellCode Execution Bypass☆129Updated 5 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆347Updated 3 years ago
- Steal privileged token to obtain SYSTEM shell☆251Updated 5 years ago
- Process Injection Techniques with Golang☆79Updated 5 years ago
- Golang evasion tool, execute-assembly .Net file☆97Updated 3 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆232Updated 5 years ago
- Reflectively load PE☆104Updated 5 years ago
- Go library for credentials recovery☆223Updated 3 years ago
- Windows NTLM Authentication Backdoor☆240Updated 8 months ago
- Process injection techniques written in Go.☆64Updated 2 years ago
- ☆161Updated 3 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆114Updated 4 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆70Updated 6 years ago
- a patched sshd for red team activities☆83Updated 4 years ago
- Golang version of https://github.com/hasherezade/libpeconv☆27Updated 5 years ago
- Beacon Object File (BOF) Creation Helper☆230Updated 3 years ago
- Allow a Go process to dynamically load .NET assemblies☆149Updated 5 years ago
- Encrypting shellcode to Bypass AV☆71Updated 6 years ago
- Reflective DLL loading of your favorite Golang program☆171Updated 5 years ago
- LOLBINs that inject a DLL into a given process ID.☆138Updated 3 years ago
- Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.☆154Updated 5 years ago
- Privilege Escalation Via RpcSs svc☆181Updated 3 years ago
- Check, exploit, generate class, obfuscate, TLS, ACME about log4j2 vulnerability in one Go program.☆56Updated 3 years ago
- A backdoor module for Apache2☆198Updated 5 years ago
- Go implementation of the Heaven's Gate technique☆101Updated 4 years ago
- Demo of process injection, using Nt, direct syscall, etc.☆28Updated 4 years ago
- Use to build an anonymous SMB file server.