D00Movenok / goMalleableLinks
🔎🪲 Malleable C2 profiles parser and assembler written in golang
☆66Updated last year
Alternatives and similar repositories for goMalleable
Users that are interested in goMalleable are comparing it to the libraries listed below
Sorting:
- A PoC package for hosting the CLR and executing .NET from Go☆74Updated 11 months ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆112Updated 4 years ago
- Winsocket for Cobalt Strike.☆98Updated last year
- ☆142Updated 2 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Updated 2 years ago
- Golang implementation of @CCob's C# ThreadlessInject☆32Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆83Updated 2 years ago
- ☆88Updated 2 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- ☆81Updated last year
- A Golang implant that uses Discord as a C2 team server☆66Updated 6 months ago
- Golang evasion tool, execute-assembly .Net file☆97Updated 3 years ago
- Perform DCSync operation without mimikatz☆146Updated 7 months ago
- ☆71Updated last year
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆206Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆58Updated last year
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆131Updated 3 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 8 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆45Updated 3 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆78Updated 2 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆140Updated 3 years ago
- CVE-2024-40711-exp☆42Updated 8 months ago
- Beacon Object File (BOF) Template☆51Updated 7 months ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆110Updated 2 years ago