D00MFist / Go4aRunLinks
Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process
☆233Updated 5 years ago
Alternatives and similar repositories for Go4aRun
Users that are interested in Go4aRun are comparing it to the libraries listed below
Sorting:
- Reflective DLL loading of your favorite Golang program☆169Updated 5 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆272Updated 2 years ago
- Apply a filter to the events being reported by windows event logging☆262Updated 4 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆192Updated 4 years ago
- Evading WinDefender ATP credential-theft☆256Updated 5 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆219Updated 2 years ago
- Allow a Go process to dynamically load .NET assemblies☆149Updated 5 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆190Updated 4 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆342Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆218Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆243Updated 4 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆280Updated 9 months ago
- ☆72Updated 3 years ago
- Executes position independent shellcode from an encrypted zip☆305Updated 4 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆346Updated 5 years ago
- ☆113Updated 4 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Updated last year
- Print Spooler Named Pipe Impersonation for Cobalt Strike☆263Updated 5 years ago
- Dll that can be used for side loading and other attack vector.☆202Updated 4 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆491Updated 4 years ago
- Process Injection Techniques with Golang☆79Updated 5 years ago
- Golang PE injection on windows☆167Updated 4 years ago
- Scripts for performing and detecting parent PID spoofing☆146Updated 5 years ago
- Load any Beacon Object File using Powershell!☆256Updated 3 years ago
- Collection of beacon BOF written to learn windows and cobaltstrike☆355Updated 2 years ago
- Cobalt Strike Aggressor extension for Visual Studio Code☆134Updated last year
- Pass the Hash to a named pipe for token Impersonation☆303Updated last year
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)☆318Updated 3 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆246Updated 4 years ago
- Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.☆204Updated 8 years ago