EvilBytecode / Ebyte-Go-MorpherLinks
Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates directly on the Go Abstract Syntax Tree (AST) and generates both obfuscated source files and runtime decryption logic.
☆100Updated last month
Alternatives and similar repositories for Ebyte-Go-Morpher
Users that are interested in Ebyte-Go-Morpher are comparing it to the libraries listed below
Sorting:
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆216Updated 2 months ago
- .NET tool used to enrich RPC telemetry☆96Updated 2 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 5 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆225Updated last month
- Utilizng an MCP Server to communicate with your C2☆78Updated 3 months ago
- A fork of the Go language with some tweaks☆51Updated 6 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆132Updated 3 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆75Updated last month
- Convert your shellcode into an ASCII string☆109Updated last month
- Modern PIC implant for Windows (64 & 32 bit)☆102Updated last month
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆140Updated 4 months ago
- ☆163Updated 3 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆78Updated 7 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 4 months ago
- Malware traffic obfuscation library☆36Updated last month
- Go Shellcode Loader to be Integrated in Exploration C2☆27Updated 6 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆44Updated 2 months ago
- Seamless remote browser session control☆189Updated last month
- A BOF to enumerate system process, their protection levels, and more.☆119Updated 8 months ago
- A small How-To on creating your own weaponized WSL file☆110Updated last month
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆92Updated 4 months ago
- A red teaming attack paradigm against AI Agents☆31Updated 5 months ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆119Updated last year
- Indirect Syscall with TartarusGate Approach in Go☆128Updated last month
- Remote DLL Injection with Timer-based Shellcode Execution☆94Updated last month
- BOF to decrypt Signal Desktop chat logs☆66Updated 6 months ago
- Monarch - The Adversary Emulation Toolkit☆63Updated 7 months ago
- Python tool to interact with WMI StdRegProv☆60Updated 9 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆149Updated 6 months ago
- AI-based implant feature☆25Updated 3 months ago