Jhangju / goLang-injectorsLinks
This project will guide yout to awareness of injection in almost every window API and process.
☆25Updated 3 years ago
Alternatives and similar repositories for goLang-injectors
Users that are interested in goLang-injectors are comparing it to the libraries listed below
Sorting:
- A PoC package for hosting the CLR and executing .NET from Go☆76Updated last year
- Patch AMSI and ETW in remote process via direct syscall☆83Updated 3 years ago
- ☆123Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆156Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆160Updated last year
- ☆124Updated last year
- ☆122Updated 2 years ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆114Updated 2 months ago
- An App Domain Manager Injection DLL PoC on steroids☆180Updated last year
- Bypass LSA protection using the BYODLL technique☆168Updated last year
- ☆141Updated 2 years ago
- Indirect Syscall with TartarusGate Approach in Go☆132Updated 2 months ago
- Library of BOFs to interact with SQL servers☆203Updated last month
- ☆159Updated 2 years ago
- ☆81Updated last year
- ApexLdr is a DLL Payload Loader written in C☆113Updated last year
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆147Updated 3 years ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆242Updated 3 months ago
- A nice process dumping tool☆82Updated 3 years ago
- Single executable reverse SOCKS5 proxy written in Golang.☆140Updated 8 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆131Updated 7 months ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆121Updated 2 years ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year
- I have documented all of the AMSI patches that I learned till now☆73Updated 5 months ago
- load shellcode without P/D Invoke and VirtualProtect call.☆120Updated 2 weeks ago
- ☆131Updated last year
- Shaco is a linux agent for havoc☆166Updated last year
- Reasonably undetected shellcode stager and executer.☆37Updated 4 months ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆75Updated 10 months ago