Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process
☆230Jul 30, 2020Updated 5 years ago
Alternatives and similar repositories for Go4aRun
Users that are interested in Go4aRun are comparing it to the libraries listed below
Sorting:
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆494Apr 1, 2021Updated 4 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆595Jul 26, 2021Updated 4 years ago
- Managed assembly shellcode generation☆280Mar 19, 2021Updated 4 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Mar 5, 2020Updated 5 years ago
- Allow a Go process to dynamically load .NET assemblies☆150Mar 28, 2020Updated 5 years ago
- Reflectively load PE☆106Aug 4, 2020Updated 5 years ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆244Aug 12, 2020Updated 5 years ago
- A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls o…☆1,172Feb 25, 2023Updated 3 years ago
- YouTube/Livestream project for obfuscating C# source code using Roslyn☆129May 9, 2021Updated 4 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Dec 27, 2019Updated 6 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆235Feb 15, 2021Updated 5 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Aug 31, 2021Updated 4 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- Remove API hooks from a Beacon process.☆282Sep 18, 2021Updated 4 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Jul 14, 2021Updated 4 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago
- RDI implementation in Nim☆64Dec 12, 2020Updated 5 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Mar 31, 2021Updated 4 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆469Mar 8, 2023Updated 2 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆607Feb 16, 2023Updated 3 years ago
- Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File☆216Oct 8, 2020Updated 5 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆527Oct 12, 2022Updated 3 years ago
- My CobaltStrike BOFS☆167Jul 23, 2022Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆223Dec 5, 2020Updated 5 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆513Sep 23, 2020Updated 5 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)☆321Nov 9, 2021Updated 4 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆101Sep 30, 2020Updated 5 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆284Oct 29, 2024Updated last year
- Encrypt embedded go files using age.☆49Oct 21, 2021Updated 4 years ago
- Red Team C code repo☆568Dec 16, 2024Updated last year