EvilBytecode / GoEvilDocsLinks
Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.
☆12Updated 4 months ago
Alternatives and similar repositories for GoEvilDocs
Users that are interested in GoEvilDocs are comparing it to the libraries listed below
Sorting:
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆11Updated 4 months ago
- Ransomware written in go, encrypt - decrypt.☆26Updated 4 months ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 4 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆39Updated 4 months ago
- A malicous Golang Package☆14Updated 4 months ago
- ☆19Updated 3 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 4 months ago
- A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.☆11Updated 4 months ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated 2 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated 8 months ago
- Rehashing APIs to prevent hash based detection☆12Updated 7 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆49Updated 4 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆23Updated 4 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- Public repo of some woking evilginx phishlets☆37Updated 9 months ago
- ☆57Updated 10 months ago
- Lifetime AMSI bypass.☆35Updated 4 months ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Updated 8 months ago
- ☆29Updated last year
- ECC Public Key Cryptography☆39Updated last year
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 4 months ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆20Updated last year
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 4 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 4 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago