Enelg52 / OffensiveGoLinks
Golang weaponization for red teamers.
β510Updated last year
Alternatives and similar repositories for OffensiveGo
Users that are interested in OffensiveGo are comparing it to the libraries listed below
Sorting:
- 𦫠| GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specificβ¦β596Updated 5 months ago
- A Go-based Exploit Frameworkβ362Updated 3 weeks ago
- A collection of offensive Go packages inspired by different Go repositories.β245Updated 11 months ago
- Golang library for malware developmentβ369Updated 10 months ago
- βοΈπ€« Stealth redirector for your red team operation securityβ715Updated 3 months ago
- Real fucking shellcode encryptor & obfuscator toolβ941Updated last month
- reverse shell using curlβ461Updated last year
- A command and control framework written in rust.β370Updated last month
- β564Updated last year
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.β805Updated 7 months ago
- Red team Interview Questionsβ687Updated 6 months ago
- Tool to remotely dump secrets from the Windows registryβ497Updated 4 months ago
- β570Updated last month
- Because AV evasion should be easy.β814Updated 10 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.β474Updated 3 weeks ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the targetβ¦β391Updated 5 months ago
- Simulate the behavior of AV/EDR for malware development training.β540Updated last year
- Kubernetes exploitation toolβ363Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph APIβ609Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.β1,201Updated 3 months ago
- ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native execβ¦β373Updated 5 months ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxyβ462Updated 2 years ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety ofβ¦β425Updated last month
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)β278Updated 7 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.β527Updated 5 months ago
- Shellcode loader generator with multiples featuresβ496Updated 9 months ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.β434Updated 2 years ago
- Extract and execute a PE embedded within a PNG file using an LNK file.β444Updated 11 months ago
- it is very goodβ517Updated 2 years ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β757Updated 9 months ago