EvilBytecode / Evil-GoLinks
A malicous Golang Package
☆15Updated 5 months ago
Alternatives and similar repositories for Evil-Go
Users that are interested in Evil-Go are comparing it to the libraries listed below
Sorting:
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 5 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆23Updated 5 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 5 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆12Updated 5 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆11Updated 5 months ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 5 months ago
- Ransomware written in go, encrypt - decrypt.☆29Updated 5 months ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆20Updated last month
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 5 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆79Updated 3 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆43Updated 4 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 5 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆50Updated 4 months ago
- ☆58Updated 11 months ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆13Updated 5 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated last year
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆53Updated 5 months ago
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Updated 5 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆44Updated last month
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆47Updated 3 months ago
- PDF Icon File Type Spoofer☆17Updated last year
- Troll TaskManager, and play with it .☆27Updated 2 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆38Updated last year
- Unhook Ntdll.dll, Go & C++.☆29Updated 5 months ago
- ☆20Updated 5 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆44Updated last year
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆25Updated last year
- ☆29Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- NailaoLoader: Hiding Execution Flow via Patching☆20Updated 7 months ago