MrTuxx / OffensiveGolangLinks
A collection of offensive Go packages inspired by different Go repositories.
☆245Updated 10 months ago
Alternatives and similar repositories for OffensiveGolang
Users that are interested in OffensiveGolang are comparing it to the libraries listed below
Sorting:
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆309Updated this week
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆279Updated 2 years ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆386Updated 11 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆188Updated last year
- Golang library for malware development☆368Updated 10 months ago
- Awesome Privilege Escalation☆125Updated 2 years ago
- Amsi Bypass payload that works on Windwos 11☆376Updated 2 years ago
- ☆303Updated 6 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆137Updated 5 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆210Updated 5 months ago
- A collection of Offensive Go packages.☆214Updated 3 years ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆243Updated 3 months ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆269Updated 2 years ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆255Updated last month
- Lab used for workshop and CTF☆271Updated last month
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆283Updated last month
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆148Updated 2 years ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆206Updated 5 months ago
- Tool to remotely dump secrets from the Windows registry☆485Updated 3 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆274Updated 6 months ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆160Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆537Updated last year
- Multiplayer pivoting solution☆418Updated last month
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆191Updated 10 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆336Updated 2 years ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆430Updated 6 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆156Updated 2 years ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆166Updated 3 months ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆240Updated 5 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆366Updated 7 months ago