D00Movenok / goMalleableLinks
🔎🪲 Malleable C2 profiles parser and assembler written in golang
☆67Updated last year
Alternatives and similar repositories for goMalleable
Users that are interested in goMalleable are comparing it to the libraries listed below
Sorting:
- A Golang implant that uses Discord as a C2 team server☆67Updated 8 months ago
- A PoC package for hosting the CLR and executing .NET from Go☆76Updated last year
- Winsocket for Cobalt Strike.☆99Updated 2 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆142Updated 3 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 3 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆114Updated 4 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆110Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆84Updated 2 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- Golang implementation of @CCob's C# ThreadlessInject☆31Updated last year
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆131Updated 3 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆184Updated 3 years ago
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆60Updated 2 years ago
- Perform DCSync operation without mimikatz☆148Updated 9 months ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Updated 2 years ago
- Extracts TEXT section of a PE, ELF, or Mach-O executable to shellcode☆104Updated 2 years ago
- Golang evasion tool, execute-assembly .Net file☆97Updated 3 years ago
- Savoir is a tool to perform tasks during internal security assessment☆19Updated 3 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆85Updated 2 years ago
- In-memory token vault BOF for Cobalt Strike☆145Updated 3 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 4 years ago
- POC tools for exploring SMB over QUIC protocol☆128Updated 3 years ago
- A collection of C# utilities intended to be used with Cobalt Strike's execute-assembly☆48Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 10 months ago
- ☆142Updated 2 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆149Updated 2 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆58Updated 2 years ago
- ErebusGate for Nim Bypass AV/EDR☆164Updated 2 years ago