EvilBytecode / Ebyte-Go-MorpherLinks
Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates directly on the Go Abstract Syntax Tree (AST) and generates both obfuscated source files and runtime decryption logic.
☆120Updated 5 months ago
Alternatives and similar repositories for Ebyte-Go-Morpher
Users that are interested in Ebyte-Go-Morpher are comparing it to the libraries listed below
Sorting:
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆101Updated 3 months ago
- Enumerate active EDR's on the system☆148Updated 3 months ago
- ☆95Updated 4 months ago
- A fork of the Go language with some tweaks☆52Updated 11 months ago
- .NET tool used to enrich RPC telemetry☆101Updated 6 months ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆250Updated 6 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Updated 3 weeks ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 9 months ago
- Caddy v2 module to filter requests based on C2 profiles☆45Updated 8 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆90Updated 4 months ago
- Utilizng an MCP Server to communicate with your C2☆86Updated 7 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆81Updated 6 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆90Updated 11 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆130Updated 3 weeks ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 5 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆151Updated 9 months ago
- A BOF to enumerate system process, their protection levels, and more.☆123Updated last year
- dump Chrome cookies remotely with atexec and CDP☆68Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆426Updated 2 months ago
- ☆92Updated last year
- Convert your shellcode into an ASCII string☆124Updated 6 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆152Updated 5 months ago
- Indirect Syscall with TartarusGate Approach in Go☆130Updated 5 months ago
- BOF to decrypt Signal Desktop chat logs☆72Updated 10 months ago
- Local & remote Windows DLL Proxying☆169Updated last year
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆129Updated 3 months ago
- AI-based implant feature☆25Updated 8 months ago
- ☆46Updated last month
- Malware traffic obfuscation library☆40Updated 5 months ago