EvilBytecode / GoEvilDocsLinks
Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.
☆15Updated 9 months ago
Alternatives and similar repositories for GoEvilDocs
Users that are interested in GoEvilDocs are comparing it to the libraries listed below
Sorting:
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Updated 9 months ago
- Parent Process ID Spoofing, coded in CGo.☆24Updated 9 months ago
- A malicous Golang Package☆15Updated 9 months ago
- Ransomware written in go, encrypt - decrypt.☆29Updated 9 months ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆25Updated 5 months ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- A simple website to act as a store for havoc modules and extensions☆28Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Updated 9 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆25Updated 9 months ago
- ☆59Updated last year
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆22Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Updated 9 months ago
- Rehashing APIs to prevent hash based detection☆14Updated last year
- ☆27Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- ☆21Updated 3 weeks ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆18Updated 8 months ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆14Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- Reproducing the SkeletonKey malware.☆10Updated last year
- ☆12Updated last year
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆18Updated 6 years ago
- Repository to gather the BOF files I will be developing☆11Updated last year
- A simple rpc2socks alternative in pure Go.☆31Updated last year
- Unhook Ntdll.dll, Go & C++.☆32Updated 9 months ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆27Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 9 months ago
- shellcode transformation tool for YARA evasion☆50Updated last month