Golang weaponization for red teamers.
β516Jan 17, 2024Updated 2 years ago
Alternatives and similar repositories for OffensiveGo
Users that are interested in OffensiveGo are comparing it to the libraries listed below
Sorting:
- 𦫠| GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specificβ¦β660Apr 27, 2025Updated 10 months ago
- indirect syscalls for AV/EDR evasion in Go assemblyβ374Jun 13, 2023Updated 2 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.β762Jan 26, 2025Updated last year
- Golang library for malware developmentβ386Nov 20, 2024Updated last year
- βοΈπ€« Stealth redirector for your red team operation securityβ1,067Updated this week
- ROP-based sleep obfuscation to evade memory scannersβ376Jun 22, 2025Updated 8 months ago
- A BOF that runs unmanaged PEs inlineβ681Oct 23, 2024Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.β614Jan 2, 2025Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strikeβ675Aug 15, 2025Updated 6 months ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layerβ541Feb 13, 2024Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's sectionβ148Dec 16, 2023Updated 2 years ago
- C++ self-Injecting dropper based on various EDR evasion techniques.β427Feb 11, 2024Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniquesβ389Jun 21, 2023Updated 2 years ago
- β716Mar 22, 2024Updated last year
- Bypassing UAC with SSPI Datagram Contextsβ462Sep 24, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniβ¦β1,370Oct 27, 2023Updated 2 years ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).β586Mar 19, 2024Updated last year
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processesβ1,042Jun 20, 2023Updated 2 years ago
- Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8β351Aug 29, 2024Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFsβ609Feb 21, 2024Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird β¦β779Jan 26, 2026Updated last month
- Shellcode loader generator with multiples featuresβ508Dec 31, 2024Updated last year
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.β1,561Aug 20, 2024Updated last year
- A small x64 library to load dll's into memory.β457Nov 6, 2023Updated 2 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. π¦β1,131Oct 21, 2024Updated last year
- EDR Lab for Experimentation Purposesβ1,415Updated this week
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rustβ1,834Dec 29, 2025Updated 2 months ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driverβ294Apr 21, 2025Updated 10 months ago
- A modern 32/64-bit position independent implant templateβ1,295Mar 21, 2025Updated 11 months ago
- Rust Weaponization for Red Team Engagements.β2,988Apr 25, 2024Updated last year
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUSTβ721Aug 18, 2023Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.β435Dec 21, 2023Updated 2 years ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooksβ164Jan 4, 2024Updated 2 years ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph APIβ622Jun 25, 2024Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercerβ738May 19, 2023Updated 2 years ago
- Dump cookies and credentials directly from Chrome/Edge process memoryβ1,410Jan 19, 2026Updated last month
- Different methods to get current username without using whoamiβ186Feb 12, 2024Updated 2 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.β372Sep 29, 2025Updated 5 months ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this pβ¦β228Jun 6, 2023Updated 2 years ago