EvilBytecode / GoEvilDocsLinks
Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.
☆14Updated 8 months ago
Alternatives and similar repositories for GoEvilDocs
Users that are interested in GoEvilDocs are comparing it to the libraries listed below
Sorting:
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Updated 8 months ago
- Parent Process ID Spoofing, coded in CGo.☆24Updated 8 months ago
- Ransomware written in go, encrypt - decrypt.☆30Updated 8 months ago
- A malicous Golang Package☆15Updated 8 months ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆25Updated 4 months ago
- ☆21Updated last week
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆25Updated 8 months ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆22Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Updated 8 months ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- A simple website to act as a store for havoc modules and extensions☆28Updated 11 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Updated 8 months ago
- ☆27Updated 2 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆28Updated 8 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 8 months ago
- ☆59Updated last year
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆27Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- PDF Icon File Type Spoofer☆17Updated last year
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆38Updated 2 years ago
- A simple rpc2socks alternative in pure Go.☆31Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆24Updated 2 years ago