Jhangju / goLang-injectorsLinks
This project will guide yout to awareness of injection in almost every window API and process.
☆25Updated 3 years ago
Alternatives and similar repositories for goLang-injectors
Users that are interested in goLang-injectors are comparing it to the libraries listed below
Sorting:
- Indirect Syscall with TartarusGate Approach in Go☆128Updated last month
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- A PoC package for hosting the CLR and executing .NET from Go☆76Updated last year
- ☆124Updated last year
- ☆122Updated 2 years ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆106Updated 3 weeks ago
- An App Domain Manager Injection DLL PoC on steroids☆172Updated last year
- ApexLdr is a DLL Payload Loader written in C☆111Updated last year
- ☆188Updated last year
- A nice process dumping tool☆82Updated 3 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year
- Patch AMSI and ETW in remote process via direct syscall☆83Updated 3 years ago
- Good CLR Host with Native patchless AMSI Bypass☆84Updated 3 months ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆173Updated 2 years ago
- ☆158Updated 2 years ago
- ☆124Updated 11 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆128Updated 6 months ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆74Updated 9 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year
- ☆136Updated 2 years ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆160Updated last year
- Linker for Beacon Object Files☆124Updated 3 weeks ago
- ☆129Updated last year
- A Mythic agent for Windows written in C☆131Updated 3 weeks ago
- Bypass LSA protection using the BYODLL technique☆167Updated 10 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆127Updated 3 months ago
- ☆142Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆37Updated 2 months ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆119Updated last year
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆143Updated 2 weeks ago