0xrawsec / golang-etwLinks
☆41Updated 3 years ago
Alternatives and similar repositories for golang-etw
Users that are interested in golang-etw are comparing it to the libraries listed below
Sorting:
- A PoC package for hosting the CLR and executing .NET from Go☆76Updated last year
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆62Updated 2 years ago
- Go implementation of the Heaven's Gate technique☆100Updated 4 years ago
- Client/server code that impersonates TLS 1.3 to disguise C2 activity.☆73Updated 3 years ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆67Updated last year
- Process Injection Techniques with Golang☆80Updated 5 years ago
- Reflectively load PE☆104Updated 5 years ago
- ☆148Updated 2 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆179Updated 3 months ago
- Go interface to NTDLL functions☆78Updated last year
- Process injection techniques written in Go.☆64Updated 2 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆114Updated 4 years ago
- The DCE/RPC / MS-RPC Codegen/Client for Go☆125Updated this week
- This repo will contain the core detection, only for Cobaltstrike's leaked versions. Non-leaked version detections wont be shared☆88Updated 2 years ago
- Go library for ETW (Event Tracing for Windows) events processing☆68Updated 3 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆40Updated 2 years ago
- Simple windows rpc server for research purposes only☆83Updated 3 years ago
- Extracts TEXT section of a PE, ELF, or Mach-O executable to shellcode☆106Updated 2 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Updated 4 years ago
- Use to copy a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.☆118Updated 4 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆70Updated 6 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆61Updated 4 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆130Updated 2 years ago
- ☆87Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆65Updated 3 years ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆100Updated 2 months ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 4 years ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆73Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆104Updated 4 years ago
- Etwti-UnhookPOC just for test☆12Updated 3 years ago