3xploit666 / AesGoLinks
helper encrypt data
☆10Updated 4 years ago
Alternatives and similar repositories for AesGo
Users that are interested in AesGo are comparing it to the libraries listed below
Sorting:
- Modular C2 server to tame your pack of wolves☆16Updated this week
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Updated 9 months ago
- Self-healing RAT utilizing libp2p☆88Updated 4 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Updated 3 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32Updated 5 years ago
- Windows Process Injection Toolkit - plain and simple :)☆26Updated 6 years ago
- Shared library loading application for Linux written in Go.☆16Updated 4 years ago
- Shellcode process injector☆28Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- A Portable Executable parser for Golang☆47Updated 6 months ago
- Finding code caves in ELF files with GoLang☆26Updated 7 years ago
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆24Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- Go API Client for Metasploit RPC API☆18Updated 2 months ago
- Shellcode library as a Go package☆70Updated 5 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Encrypts and loads encrypted DLLs☆56Updated 6 years ago
- NanoDumpInject from https://s3cur3th1ssh1t.github.io/Reflective-Dump-Tools/ , minor edits with a few syscalls☆11Updated 3 years ago
- Golang ransomware☆46Updated 4 years ago
- ☆33Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Updated 4 years ago
- Keep it secret, keep it safe☆76Updated 5 months ago
- WMI SA stuffs☆30Updated 3 years ago
- Red Team C2 and Post Exploitation code☆36Updated 2 weeks ago
- Golang Implant & Post-Exploitation Framework☆59Updated 2 years ago
- ☆14Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Updated 2 years ago
- A tool suite for use during system assessments.☆35Updated last month