EvilBytecode / GoEvilDocsLinks
Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.
☆12Updated 4 months ago
Alternatives and similar repositories for GoEvilDocs
Users that are interested in GoEvilDocs are comparing it to the libraries listed below
Sorting:
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆11Updated 4 months ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 4 months ago
- Ransomware written in go, encrypt - decrypt.☆28Updated 4 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 4 months ago
- A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.☆11Updated 4 months ago
- A malicous Golang Package☆14Updated 4 months ago
- ☆20Updated 4 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆24Updated 4 months ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated 3 months ago
- Rehashing APIs to prevent hash based detection☆13Updated 8 months ago
- Malware Libraries focused in help Malware Development☆24Updated 2 years ago
- Lifetime AMSI bypass.☆35Updated 4 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 4 months ago
- Public repo of some woking evilginx phishlets☆38Updated 10 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 4 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- exfiltration/infiltration toolkit☆24Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- ☆58Updated 10 months ago
- ECC Public Key Cryptography☆39Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆43Updated last year
- ☆12Updated 5 months ago
- ☆29Updated last year
- Deobfuscation of XorStringsNet☆14Updated 10 months ago
- RegStrike is a .reg payload generator☆58Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆71Updated last year
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated last year
- ☆19Updated 9 months ago