Binject / go-donut
Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut
☆333Updated 2 years ago
Alternatives and similar repositories for go-donut:
Users that are interested in go-donut are comparing it to the libraries listed below
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆501Updated 2 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆485Updated 4 years ago
- Dump ntds.dit really fast☆391Updated 3 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆709Updated 7 months ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆230Updated 4 years ago
- Collection of Beacon Object Files☆583Updated 2 years ago
- PIC lsass dumper using cloned handles☆582Updated 2 years ago
- Various Cobalt Strike BOFs☆630Updated 2 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆653Updated last year
- A little tool to play with the Seclogon service☆311Updated 2 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)☆315Updated 3 years ago
- A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.☆618Updated 2 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆455Updated 2 years ago
- A Nim implementation of reflective PE-Loading from memory☆278Updated 7 months ago
- ☆515Updated 2 weeks ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆471Updated 2 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆447Updated last year
- Universal Shared Library User-space Loader☆225Updated 2 years ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆469Updated 2 years ago
- A .NET Framework 4.0 Windows Agent☆471Updated last week
- Executes position independent shellcode from an encrypted zip☆303Updated 4 years ago
- Creating a repository with all public Beacon Object Files (BoFs)☆474Updated last year
- Windows UAC bypass techniques implemented and written in Go☆211Updated 3 years ago
- C# Reflective loader for unmanaged binaries.☆428Updated 2 years ago
- Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!☆441Updated 2 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆445Updated 4 years ago
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆364Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆301Updated last year
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆377Updated 2 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆478Updated 2 years ago