Binject / go-donut
Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut
☆318Updated 2 years ago
Alternatives and similar repositories for go-donut:
Users that are interested in go-donut are comparing it to the libraries listed below
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆480Updated 3 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆493Updated 2 years ago
- Dump ntds.dit really fast☆377Updated 3 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆228Updated 4 years ago
- Collection of Beacon Object Files☆566Updated 2 years ago
- Various Cobalt Strike BOFs☆600Updated 2 years ago
- A little tool to play with the Seclogon service☆308Updated 2 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆687Updated 4 months ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆629Updated last year
- Really stupid re-implementation of invoke-wmiexec☆216Updated last year
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆444Updated last year
- A Nim implementation of reflective PE-Loading from memory☆274Updated 4 months ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)☆308Updated 3 years ago
- Universal Shared Library User-space Loader☆221Updated 2 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆430Updated last year
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆256Updated 11 months ago
- PIC lsass dumper using cloned handles☆578Updated 2 years ago
- Process Injection Techniques with Golang☆76Updated 4 years ago
- Aims to identify sleeping beacons☆525Updated last month
- Golang PE injection on windows☆163Updated 3 years ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆467Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Updated last year
- indirect syscalls for AV/EDR evasion in Go assembly☆317Updated last year
- Creating a repository with all public Beacon Object Files (BoFs)☆443Updated last year
- A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.☆614Updated 2 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆443Updated 4 years ago
- Apply a filter to the events being reported by windows event logging☆260Updated 3 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆222Updated 10 months ago
- Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!☆434Updated last year