NextronSystems / go-handle
Iterate over Windows Handles
☆13Updated last year
Alternatives and similar repositories for go-handle:
Users that are interested in go-handle are comparing it to the libraries listed below
- Thanks to @d35ha☆13Updated 3 years ago
- ☆18Updated 3 years ago
- Fork of Wireguard's Memmod☆16Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆38Updated 2 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Updated 3 years ago
- Golang wrapper for the Microsoft Antimalware Scan Interface (AMSI)☆11Updated 3 years ago
- Go wrapper for in-memory DLL module loader, MemoryModule☆33Updated 7 years ago
- golang implementation of Syswhisper2/Syswhisper3☆23Updated 3 years ago
- HookDetection☆46Updated 3 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Updated 4 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- golang rpc框架,支持数据加密传输☆12Updated 3 weeks ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆41Updated 2 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆19Updated 2 years ago
- 针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复☆2Updated 3 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- Learning notes of amazing Sliver C2 project.☆25Updated 2 years ago
- ☆46Updated last year
- Savoir is a tool to perform tasks during internal security assessment☆19Updated 2 years ago
- ☆51Updated 5 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 2 years ago
- Proof of concept SMB C2 using named pipes in Golang☆25Updated 5 years ago
- DLL Unhooking☆12Updated 4 years ago
- Reflective DLL injection Execution☆19Updated 2 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆12Updated 2 years ago
- ☆13Updated 2 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆32Updated last month
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆32Updated 3 years ago
- A flexible tool that creates a minidump of the LSASS process☆13Updated 3 years ago