0xrawsec / golang-etwLinks
☆42Updated 3 years ago
Alternatives and similar repositories for golang-etw
Users that are interested in golang-etw are comparing it to the libraries listed below
Sorting:
- A PoC package for hosting the CLR and executing .NET from Go☆77Updated last year
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆62Updated 2 years ago
- Client/server code that impersonates TLS 1.3 to disguise C2 activity.☆73Updated 3 years ago
- Reflectively load PE☆104Updated 5 years ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆67Updated last year
- Go implementation of the Heaven's Gate technique☆101Updated 4 years ago
- The DCE/RPC / MS-RPC Codegen/Client for Go☆130Updated last week
- Simple PoCs for utilizing Windows syscalls in Go☆16Updated 4 years ago
- Extracts TEXT section of a PE, ELF, or Mach-O executable to shellcode☆105Updated 2 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆40Updated 2 years ago
- This repo will contain the core detection, only for Cobaltstrike's leaked versions. Non-leaked version detections wont be shared☆90Updated 2 years ago
- ☆47Updated 7 months ago
- Demo of process injection, using Nt, direct syscall, etc.☆28Updated 4 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆180Updated 5 months ago
- x64 version☆36Updated 4 years ago
- Simple windows rpc server for research purposes only☆83Updated 3 years ago
- A library to make HTTP requests with the Windows winhttp API☆23Updated last year
- golang implementation of Syswhisper2/Syswhisper3☆23Updated 3 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆114Updated 4 years ago
- Process injection techniques written in Go.☆64Updated 2 years ago
- ☆152Updated 2 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 4 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆35Updated 8 months ago
- Research project for understanding how Mimikatz work and become better at C☆124Updated 4 years ago
- Use to copy a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.☆119Updated 4 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆62Updated 4 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Updated 6 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Updated 3 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆119Updated 5 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago