EvilBytecode / Ebyte-Go-MorpherLinks
Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates directly on the Go Abstract Syntax Tree (AST) and generates both obfuscated source files and runtime decryption logic.
☆117Updated last month
Alternatives and similar repositories for Ebyte-Go-Morpher
Users that are interested in Ebyte-Go-Morpher are comparing it to the libraries listed below
Sorting:
- ☆67Updated last month
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆221Updated 3 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆232Updated 2 months ago
- .NET tool used to enrich RPC telemetry☆99Updated 3 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 6 months ago
- Utilizng an MCP Server to communicate with your C2☆80Updated 3 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆76Updated 2 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆76Updated 3 weeks ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆132Updated 4 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆87Updated 8 months ago
- ☆90Updated last year
- Convert your shellcode into an ASCII string☆114Updated 2 months ago
- BOF to decrypt Signal Desktop chat logs☆71Updated 6 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆141Updated 5 months ago
- Enumerate active EDR's on the system☆105Updated 3 weeks ago
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆223Updated 3 weeks ago
- A BOF to enumerate system process, their protection levels, and more.☆119Updated 9 months ago
- Active Directory Authentication Library☆80Updated 3 weeks ago
- A red teaming attack paradigm against AI Agents☆31Updated 6 months ago
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆128Updated last year
- ☆162Updated 4 months ago
- A fork of the Go language with some tweaks☆53Updated 7 months ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆119Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 5 months ago
- A collection of PoCs to do common things in unconventional ways☆105Updated last week
- Retrieve inner payloads from Donut samples☆106Updated last year
- Modern PIC implant for Windows (64 & 32 bit)☆103Updated last month
- Indirect Syscall with TartarusGate Approach in Go☆132Updated 2 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆149Updated 7 months ago
- ☆43Updated 2 months ago