Enelg52 / OffensiveGo
Golang weaponization for red teamers.
β488Updated last year
Alternatives and similar repositories for OffensiveGo:
Users that are interested in OffensiveGo are comparing it to the libraries listed below
- 𦫠| GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specificβ¦β523Updated last week
- A Go-based Exploit Frameworkβ318Updated this week
- A collection of offensive Go packages inspired by different Go repositories.β235Updated 3 months ago
- Golang library for malware developmentβ342Updated 3 months ago
- βοΈπ€« Stealth redirector for your red team operation securityβ659Updated 6 months ago
- Real fucking shellcode encryptor & obfuscator toolβ803Updated last month
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deploymentβ545Updated this week
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.β407Updated last year
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.β364Updated last month
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety ofβ¦β324Updated 4 months ago
- Because AV evasion should be easy.β663Updated 2 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Frameworkβ550Updated 7 months ago
- β530Updated 10 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHoundβ514Updated 3 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSβ¦β369Updated 6 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.β536Updated 2 weeks ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation incβ¦β484Updated this week
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)β241Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.β355Updated 3 months ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operationsβ284Updated 2 weeks ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at tβ¦β356Updated 2 months ago
- EDR & Antivirus Bypass to Gain Shell Accessβ231Updated 4 months ago
- A command and control framework written in rust.β304Updated last month
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the targetβ¦β348Updated last month
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.β504Updated 6 months ago
- Simulate the behavior of AV/EDR for malware development training.β460Updated last year
- Awesome EDR Bypass Resources For Ethical Hackingβ1,093Updated 3 weeks ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.β1,056Updated this week
- β338Updated last year
- AV/EDR Evasion Lab for Training & Learning Purposesβ1,146Updated this week