EvilBytecode / Ebyte-Go-MorpherLinks
Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates directly on the Go Abstract Syntax Tree (AST) and generates both obfuscated source files and runtime decryption logic.
☆119Updated 2 months ago
Alternatives and similar repositories for Ebyte-Go-Morpher
Users that are interested in Ebyte-Go-Morpher are comparing it to the libraries listed below
Sorting:
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆81Updated last month
- ☆75Updated 2 months ago
- Enumerate active EDR's on the system☆111Updated last week
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆237Updated 3 months ago
- .NET tool used to enrich RPC telemetry☆101Updated 3 months ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆226Updated 3 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 6 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆78Updated 3 months ago
- Utilizng an MCP Server to communicate with your C2☆82Updated 4 months ago
- Seamless remote browser session control☆210Updated 2 months ago
- A fork of the Go language with some tweaks☆53Updated 8 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆77Updated last month
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆134Updated 5 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆105Updated 2 weeks ago
- Malware traffic obfuscation library☆38Updated 2 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆104Updated 2 months ago
- Convert your shellcode into an ASCII string☆119Updated 3 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 6 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆142Updated 2 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆142Updated 6 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆131Updated 3 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆44Updated last month
- Monarch - The Adversary Emulation Toolkit☆63Updated 8 months ago
- Indirect Syscall with TartarusGate Approach in Go☆133Updated 2 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆87Updated 8 months ago
- BOF to decrypt Signal Desktop chat logs☆72Updated 7 months ago
- Payload encoding utility to effectively lower payload entropy.☆119Updated 5 months ago
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆245Updated last week
- A small How-To on creating your own weaponized WSL file☆115Updated 2 months ago
- POC of GITHUB simple C2 in rust☆52Updated 2 months ago