0x9ef / golang-uacbypasser
Windows UAC bypass techniques implemented and written in Go
☆210Updated 2 years ago
Alternatives and similar repositories for golang-uacbypasser:
Users that are interested in golang-uacbypasser are comparing it to the libraries listed below
- Really stupid re-implementation of invoke-wmiexec☆214Updated 2 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆328Updated 2 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆229Updated 4 years ago
- Another Go Shellcode Loader using Windows APIs☆138Updated 3 years ago
- Steal privileged token to obtain SYSTEM shell☆247Updated 4 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆187Updated 2 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆482Updated 3 years ago
- A major platforms RAT Tools .High scalability.Now support Windows/Linux/MacOS☆83Updated 2 years ago
- Process Injection Techniques with Golang☆76Updated 4 years ago
- Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)☆165Updated 4 years ago
- Windows Defender ShellCode Execution Bypass☆128Updated 5 years ago
- 破解CS4.0☆161Updated 4 years ago
- A backdoor module for Apache2☆196Updated 5 years ago
- Reflective DLL loading of your favorite Golang program☆166Updated 5 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆67Updated 6 years ago
- Reflectively load PE☆104Updated 4 years ago
- Another shellcode runner 🦀 🐚☆147Updated 3 years ago
- Allow a Go process to dynamically load .NET assemblies☆148Updated 4 years ago
- ☆159Updated 2 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆112Updated 3 years ago
- a patched sshd for red team activities☆81Updated 3 years ago
- Golang evasion tool, execute-assembly .Net file☆95Updated 2 years ago
- ABUSING WINDOWS TELEMETRY FOR PERSISTENCE☆139Updated 4 years ago
- LOLBINs that inject a DLL into a given process ID.☆137Updated 3 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆94Updated 4 years ago
- Beacon Object File (BOF) Creation Helper☆225Updated 2 years ago
- Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.☆151Updated 4 years ago
- A C2 framework for initial access in Go☆177Updated 2 years ago
- A little tool to play with the Seclogon service☆308Updated 2 years ago
- POCs for Shellcode Injection via Callbacks☆402Updated 4 years ago