EvilBytecode / GoEvilDocsLinks
Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.
☆12Updated 3 months ago
Alternatives and similar repositories for GoEvilDocs
Users that are interested in GoEvilDocs are comparing it to the libraries listed below
Sorting:
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆11Updated 3 months ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 3 months ago
- Ransomware written in go, encrypt - decrypt.☆26Updated 3 months ago
- A malicous Golang Package☆14Updated 3 months ago
- ☆19Updated 2 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆23Updated 3 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆39Updated 3 months ago
- A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.☆11Updated 3 months ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆49Updated 3 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 3 months ago
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Just another Process Injection using Process Hollowing technique.☆17Updated last year
- ☆16Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- Public repo of some woking evilginx phishlets☆37Updated 9 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated 7 months ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42Updated last year
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Updated 4 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆30Updated last month
- Rehashing APIs to prevent hash based detection☆12Updated 6 months ago
- ☆29Updated last year
- A script to automate keystrokes through a graphical desktop program.☆35Updated last month
- Lifetime AMSI bypass.☆35Updated 3 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 3 months ago
- PhantomsGate: Advanced Shellcode Injection Technique☆23Updated last year
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆41Updated 2 years ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 3 months ago