ChrisPritchard / golang-shellcode-runner
A shellcode runner / injector / hollower in Go, for windows
☆26Updated 2 years ago
Alternatives and similar repositories for golang-shellcode-runner:
Users that are interested in golang-shellcode-runner are comparing it to the libraries listed below
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆39Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆22Updated last year
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆23Updated 6 months ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆19Updated last year
- Sleep Obfuscation☆43Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- Python module for running BOFs☆67Updated last year
- ADSI based SA tool☆16Updated 2 years ago
- Load and execute a common object file format (COFF) in the current process☆26Updated 11 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆21Updated last year
- ☆28Updated 8 months ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆52Updated last year
- maldev obviously☆25Updated 2 weeks ago
- ☆36Updated 2 years ago
- ☆47Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 5 months ago
- An In-memory Embedding of CPython☆25Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- A work in progress BOF/COFF loader in Rust☆46Updated last year
- Reasonably undetected shellcode stager and executer.☆35Updated 5 months ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆25Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆68Updated last year
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆28Updated 3 years ago
- Simple HTTP async comms using standard GET/POST requests☆30Updated 3 months ago
- I have documented all of the AMSI patches that I learned till now☆73Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆53Updated last year