EvilBytecode / Evil-GoLinks
A malicous Golang Package
☆15Updated 9 months ago
Alternatives and similar repositories for Evil-Go
Users that are interested in Evil-Go are comparing it to the libraries listed below
Sorting:
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆15Updated 9 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆28Updated 9 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Updated 9 months ago
- Parent Process ID Spoofing, coded in CGo.☆24Updated 9 months ago
- Ransomware written in go, encrypt - decrypt.☆30Updated 8 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆25Updated 9 months ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆25Updated 4 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆36Updated 2 years ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆50Updated 8 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆59Updated 8 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Updated 9 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆18Updated 8 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Updated last year
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 9 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆81Updated 6 months ago
- ☆17Updated 6 years ago
- ☆27Updated 2 years ago
- PDF Icon File Type Spoofer☆17Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 8 months ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆22Updated last year
- ☆59Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆14Updated last year
- A simple website to act as a store for havoc modules and extensions☆28Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Updated last year
- Dump Linux keyrings☆23Updated last year