EvilBytecode / GoEvilDocsLinks
Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.
☆12Updated 5 months ago
Alternatives and similar repositories for GoEvilDocs
Users that are interested in GoEvilDocs are comparing it to the libraries listed below
Sorting:
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆11Updated 5 months ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 5 months ago
- Ransomware written in go, encrypt - decrypt.☆29Updated 5 months ago
- A malicous Golang Package☆15Updated 5 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 5 months ago
- ☆20Updated 5 months ago
- A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.☆11Updated 5 months ago
- Rehashing APIs to prevent hash based detection☆13Updated 9 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆24Updated 5 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆53Updated 5 months ago
- Lifetime AMSI bypass.☆35Updated 5 months ago
- Malware Libraries focused in help Malware Development☆25Updated 2 years ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆20Updated last month
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 5 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆21Updated last year
- ☆58Updated 11 months ago
- Cortex EDR Ransomware protection Bypass☆25Updated 8 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 6 months ago
- Public repo of some woking evilginx phishlets☆38Updated 11 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 10 months ago
- ECC Public Key Cryptography☆38Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆47Updated 3 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆21Updated 7 months ago
- ☆29Updated last year
- Easy peasy file uploads☆24Updated last month