☆45Sep 22, 2022Updated 3 years ago
Alternatives and similar repositories for golang-etw
Users that are interested in golang-etw are comparing it to the libraries listed below
Sorting:
- Go library for ETW (Event Tracing for Windows) events processing☆74Jul 13, 2022Updated 3 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Go implementation of an Extensible Storage Engine parser☆32Feb 15, 2025Updated last year
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42May 9, 2019Updated 6 years ago
- ☆57Apr 19, 2023Updated 2 years ago
- windows API to hide console window by golang☆35Dec 20, 2021Updated 4 years ago
- Erebus is a payload generator written in Nim.☆17Jun 13, 2023Updated 2 years ago
- Sandbox samples and monitor them with kunai☆29Mar 3, 2026Updated 2 weeks ago
- Lightweight Threat Detection System - (Base)☆15Apr 15, 2024Updated last year
- Proof of concept SMB C2 using named pipes in Golang☆25Sep 8, 2019Updated 6 years ago
- Run Processes as PPL with ELAM☆177Mar 17, 2022Updated 4 years ago
- Collect autorun records from running system☆60Jan 21, 2022Updated 4 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆162Mar 1, 2024Updated 2 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- CVE-2022-37042 Zimbra Auth Bypass leads to RCE☆30Dec 9, 2022Updated 3 years ago
- GArLIC: GolAng LInux Connector: A Proc Connector library for go☆27Jun 28, 2021Updated 4 years ago
- Run python from a single exe☆36May 1, 2022Updated 3 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆96May 9, 2023Updated 2 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- 启动一个system权限的cmd☆12Apr 23, 2021Updated 4 years ago
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- Corsair LL Access driver abuse☆24Apr 16, 2021Updated 4 years ago
- Terraform playbook of a vulnerable Azure deployment☆11Apr 28, 2022Updated 3 years ago
- ☆47Jul 9, 2022Updated 3 years ago
- awesome list of browser exploitation tutorials☆13Sep 21, 2018Updated 7 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- Repository of different kernel drivers written while studying Windows NT Driver development☆12Apr 14, 2024Updated last year
- ☆13Sep 22, 2022Updated 3 years ago
- ☆25Feb 9, 2022Updated 4 years ago
- geacon for apt profile☆21Aug 11, 2022Updated 3 years ago
- Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215☆17Nov 17, 2022Updated 3 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆31Jun 22, 2018Updated 7 years ago
- Event Tracing For Windows (ETW) Resources☆420Oct 30, 2025Updated 4 months ago
- 🌟 人生K线 - 基于 AI 大模型 + 传统八字命理的人生运势可视化工具。将命运绘制成 K 线图,像看股票一样看人生!支持自托管部署。☆59Dec 22, 2025Updated 3 months ago