EvilBytecode / GoEvilDocsLinks
Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.
☆13Updated 6 months ago
Alternatives and similar repositories for GoEvilDocs
Users that are interested in GoEvilDocs are comparing it to the libraries listed below
Sorting:
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆11Updated 6 months ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 6 months ago
- Ransomware written in go, encrypt - decrypt.☆30Updated 6 months ago
- A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.☆11Updated 6 months ago
- A malicous Golang Package☆15Updated 6 months ago
- ☆21Updated 6 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆45Updated 6 months ago
- Malware Libraries focused in help Malware Development☆26Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆23Updated 6 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆26Updated 6 months ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 5 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated 11 months ago
- ECC Public Key Cryptography☆38Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆57Updated 6 months ago
- ☆28Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Rehashing APIs to prevent hash based detection☆14Updated 10 months ago
- Public repo of some woking evilginx phishlets☆38Updated last year
- Lifetime AMSI bypass.☆35Updated 6 months ago
- AES-256 Microsoft Cryptography API Example Use.☆35Updated 2 years ago
- Excel Add In Payload Generator☆13Updated 2 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆21Updated last year
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Updated 7 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 11 months ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆16Updated 2 years ago