Enelg52 / OffensiveGoLinks
Golang weaponization for red teamers.
β500Updated last year
Alternatives and similar repositories for OffensiveGo
Users that are interested in OffensiveGo are comparing it to the libraries listed below
Sorting:
- 𦫠| GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specificβ¦β575Updated 3 months ago
- A Go-based Exploit Frameworkβ351Updated this week
- Golang library for malware developmentβ362Updated 8 months ago
- A collection of offensive Go packages inspired by different Go repositories.β245Updated 9 months ago
- βοΈπ€« Stealth redirector for your red team operation securityβ700Updated last month
- β526Updated this week
- reverse shell using curlβ459Updated last year
- Real fucking shellcode encryptor & obfuscator toolβ926Updated last month
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.β679Updated 5 months ago
- Tool to remotely dump secrets from the Windows registryβ476Updated last month
- A command and control framework written in rust.β358Updated 5 months ago
- Because AV evasion should be easy.β778Updated 8 months ago
- β544Updated last year
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the targetβ¦β376Updated 2 months ago
- Red team Interview Questionsβ667Updated 3 months ago
- Multiplayer pivoting solutionβ411Updated this week
- Windows remote execution multitoolβ644Updated last month
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.β436Updated last year
- it is very goodβ517Updated 2 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11β548Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.β1,167Updated last month
- mTLS-Encrypted Back-Connect SOCKS5 Proxyβ450Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph APIβ607Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.β435Updated 9 months ago
- Kubernetes exploitation toolβ362Updated last year
- Simulate the behavior of AV/EDR for malware development training.β532Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)β271Updated 5 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.β526Updated 3 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHoundβ588Updated 8 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSβ¦β431Updated 11 months ago