MrTuxx / OffensiveGolangLinks
A collection of offensive Go packages inspired by different Go repositories.
☆242Updated 7 months ago
Alternatives and similar repositories for OffensiveGolang
Users that are interested in OffensiveGolang are comparing it to the libraries listed below
Sorting:
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆298Updated last month
- Materials for the workshop "Red Team Ops: Havoc 101"☆380Updated 8 months ago
- A collection of Offensive Go packages.☆213Updated 3 years ago
- Simulate the behavior of AV/EDR for malware development training.☆531Updated last year
- Tool to remotely dump secrets from the Windows registry☆465Updated 2 weeks ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆324Updated last year
- AV/EDR Lab environment setup references to help in Malware development☆388Updated 4 months ago
- Useful C2 techniques and cheatsheets learned from engagements☆515Updated 2 months ago
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆565Updated last month
- Multiplayer pivoting solution☆392Updated last week
- Golang library for malware development☆358Updated 7 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆425Updated 3 months ago
- ☆299Updated 3 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆381Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆577Updated 7 months ago
- Amsi Bypass payload that works on Windwos 11☆378Updated last year
- Lab used for workshop and CTF☆250Updated last month
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆359Updated 4 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆175Updated 7 months ago
- Analyse your malware to surgically obfuscate it☆477Updated 3 weeks ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆597Updated last month
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Updated 5 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆602Updated last year
- Kraken, a modular multi-language webshell coded by @secu_x11☆544Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆524Updated 2 months ago
- A Red Team Activity Hub☆209Updated last week
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆137Updated last year
- Azure mindmap for penetration tests☆186Updated last year
- Malware development for red teaming workshop☆220Updated 3 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆205Updated 11 months ago