Jhangju / goLang-injectorsLinks
This project will guide yout to awareness of injection in almost every window API and process.
☆25Updated 3 years ago
Alternatives and similar repositories for goLang-injectors
Users that are interested in goLang-injectors are comparing it to the libraries listed below
Sorting:
- A PoC package for hosting the CLR and executing .NET from Go☆76Updated last year
- Indirect Syscall with TartarusGate Approach in Go☆132Updated 3 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆113Updated 3 months ago
- ☆124Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆161Updated last year
- ☆81Updated last year
- ☆122Updated 2 years ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆49Updated last year
- ☆122Updated 2 years ago
- ☆159Updated 2 years ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆77Updated 11 months ago
- ☆142Updated 2 years ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆132Updated 5 months ago
- ☆91Updated last year
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Updated last month
- Library of BOFs to interact with SQL servers☆204Updated last month
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆282Updated 2 years ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆142Updated 6 months ago
- Your syscall factory☆124Updated 2 weeks ago
- An App Domain Manager Injection DLL PoC on steroids☆201Updated last year
- Golang implementation of @CCob's C# ThreadlessInject☆31Updated last year
- A C# port from Invoke-GhostTask☆117Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆92Updated last year
- ☆194Updated last year
- Patch AMSI and ETW in remote process via direct syscall☆83Updated 3 years ago
- Bypass LSA protection using the BYODLL technique☆168Updated last year
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆133Updated 8 months ago
- Single executable reverse SOCKS5 proxy written in Golang.☆142Updated 9 months ago