EvilBytecode / Evil-GoLinks
A malicous Golang Package
☆14Updated 4 months ago
Alternatives and similar repositories for Evil-Go
Users that are interested in Evil-Go are comparing it to the libraries listed below
Sorting:
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 4 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆23Updated 4 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆11Updated 4 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆42Updated 3 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆12Updated 4 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆52Updated 4 months ago
- Ransomware written in go, encrypt - decrypt.☆28Updated 4 months ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 4 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 4 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆11Updated 4 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 4 months ago
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Updated 4 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆38Updated last year
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆76Updated 2 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆71Updated last year
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆57Updated 4 months ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆17Updated 3 weeks ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Updated 2 months ago
- Dump Linux keyrings☆20Updated last year
- PDF Icon File Type Spoofer☆16Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆33Updated last year
- ☆58Updated 10 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆50Updated 4 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆23Updated 4 months ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆13Updated 4 months ago
- Troll TaskManager, and play with it .☆26Updated last month
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆26Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆71Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆41Updated 6 months ago