MrTuxx / OffensiveGolang
A collection of offensive Go packages inspired by different Go repositories.
☆239Updated 4 months ago
Alternatives and similar repositories for OffensiveGolang:
Users that are interested in OffensiveGolang are comparing it to the libraries listed below
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆289Updated last week
- A collection of Offensive Go packages.☆210Updated 3 years ago
- Multiplayer pivoting solution☆300Updated 3 weeks ago
- Simulate the behavior of AV/EDR for malware development training.☆516Updated last year
- Materials for the workshop "Red Team Ops: Havoc 101"☆369Updated 5 months ago
- ☆294Updated 2 weeks ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆577Updated 9 months ago
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆540Updated last week
- Amsi Bypass payload that works on Windwos 11☆376Updated last year
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆122Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆300Updated last year
- Collection of Notes and CheatSheets used for Red teaming Certs☆228Updated 2 years ago
- Tool to remotely dump secrets from the Windows registry☆437Updated last month
- AV/EDR Lab environment setup references to help in Malware development☆369Updated last month
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆649Updated last week
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆270Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆179Updated 6 months ago
- Useful C2 techniques and cheatsheets learned from engagements☆481Updated 2 weeks ago
- ↕️🤫 Stealth redirector for your red team operation security☆670Updated 7 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆472Updated 4 months ago
- Golang library for malware development☆348Updated 4 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆148Updated 5 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆407Updated last week
- ☆274Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆367Updated 3 months ago
- Nuclei templates for honeypots detection.☆195Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆534Updated 4 months ago
- Analyse your malware to surgically obfuscate it☆457Updated last month
- ☆161Updated this week
- Azure mindmap for penetration tests☆179Updated last year