MrTuxx / OffensiveGolangLinks
A collection of offensive Go packages inspired by different Go repositories.
☆251Updated last year
Alternatives and similar repositories for OffensiveGolang
Users that are interested in OffensiveGolang are comparing it to the libraries listed below
Sorting:
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆316Updated last week
- Materials for the workshop "Red Team Ops: Havoc 101"☆388Updated last year
- A collection of Offensive Go packages.☆214Updated 3 years ago
- Golang library for malware development☆374Updated last year
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆177Updated last year
- Awesome Privilege Escalation☆134Updated 3 years ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆153Updated 2 years ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆221Updated 7 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆281Updated 2 years ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆137Updated 7 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆280Updated 8 months ago
- winPEAS, but for Active Directory☆167Updated 7 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆346Updated 2 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆182Updated 2 years ago
- ☆306Updated 8 months ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆268Updated 2 years ago
- Amsi Bypass payload that works on Windwos 11☆376Updated 2 years ago
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that are useful for internal penetration tests and a…☆288Updated 2 weeks ago
- Multiplayer pivoting solution☆462Updated 2 weeks ago
- Generate FUD backdoors☆262Updated 2 years ago
- Tool to remotely dump secrets from the Windows registry☆510Updated this week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆643Updated last month
- Lab used for workshop and CTF☆345Updated last week
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆170Updated 5 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆190Updated last year
- ☆291Updated 2 years ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆393Updated 6 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆202Updated last year
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆249Updated 5 months ago
- Tuoni☆189Updated 2 weeks ago