EvilBytecode / Ebyte-Go-MorpherLinks
Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates directly on the Go Abstract Syntax Tree (AST) and generates both obfuscated source files and runtime decryption logic.
☆121Updated 6 months ago
Alternatives and similar repositories for Ebyte-Go-Morpher
Users that are interested in Ebyte-Go-Morpher are comparing it to the libraries listed below
Sorting:
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆105Updated 5 months ago
- Enumerate active EDR's on the system☆150Updated 4 months ago
- A fork of the Go language with some tweaks☆55Updated last year
- .NET tool used to enrich RPC telemetry☆101Updated last week
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆254Updated 7 months ago
- ☆96Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 11 months ago
- Utilizng an MCP Server to communicate with your C2☆86Updated 8 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Updated 5 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆180Updated 3 weeks ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Updated 2 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆155Updated 10 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆81Updated 7 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆140Updated 2 months ago
- A collection of PoCs to do common things in unconventional ways☆122Updated 5 months ago
- Malware traffic obfuscation library☆39Updated 6 months ago
- PoC for generating bthprops.cpl module designed to be loaded by Fsquirt.exe LOLBin☆121Updated last month
- Remote DLL Injection with Timer-based Shellcode Execution☆153Updated 6 months ago
- Reaping treasures from strings in remote processes memory☆285Updated 11 months ago
- Convert your shellcode into an ASCII string☆125Updated 7 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆430Updated 4 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 6 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆53Updated 4 months ago
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆230Updated last week
- BOF to decrypt Signal Desktop chat logs☆72Updated 11 months ago
- Caddy v2 module to filter requests based on C2 profiles☆46Updated 9 months ago
- A BOF to enumerate system process, their protection levels, and more.☆124Updated last year
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆82Updated 2 months ago
- A red teaming attack paradigm against AI Agents☆32Updated 10 months ago
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆257Updated 4 months ago