BlackShell256 / ShellGoLinks
Simple Shellcode Loader tool
☆26Updated last year
Alternatives and similar repositories for ShellGo
Users that are interested in ShellGo are comparing it to the libraries listed below
Sorting:
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆78Updated 2 years ago
- Winsocket for Cobalt Strike.☆98Updated last year
- Reasonably undetected shellcode stager and executer.☆37Updated last month
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆45Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- ☆53Updated 3 years ago
- C# havoc implant☆99Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆95Updated last year
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 9 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆54Updated 5 months ago
- .bin file to shellcode convertor☆38Updated 11 months ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 8 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated 2 years ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆74Updated 7 months ago
- Office 365 and Exchange Enumeration Version 2☆18Updated last year
- ☆71Updated last year
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- ☆88Updated last year
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆17Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆40Updated 8 months ago
- Terminate AV/EDR leveraging BYOVD attack☆87Updated 3 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- Dump Windows SAM hashes☆42Updated last year
- Aggressor script add-in for CobaltStrike to track file uploads☆36Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year