NextronSystems / go-handleLinks
Iterate over Windows Handles
☆14Updated last year
Alternatives and similar repositories for go-handle
Users that are interested in go-handle are comparing it to the libraries listed below
Sorting:
- Golang wrapper for the Microsoft Antimalware Scan Interface (AMSI)☆11Updated 3 years ago
- golang implementation of Syswhisper2/Syswhisper3☆23Updated 3 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆32Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- Thanks to @d35ha☆13Updated 3 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 3 years ago
- HookDetection☆46Updated 3 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- Fork of Wireguard's Memmod☆16Updated 2 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆35Updated 2 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Updated 3 years ago
- A simple llvm pass used in BOF compiling☆8Updated 6 months ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆34Updated 3 years ago
- Learning notes of amazing Sliver C2 project.☆25Updated 2 years ago
- ☆18Updated 3 years ago
- Savoir is a tool to perform tasks during internal security assessment☆19Updated 3 years ago
- Reflective DLL injection Execution☆19Updated 2 years ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆26Updated last year
- DLL Unhooking☆12Updated 4 years ago
- x64 version☆36Updated 3 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆33Updated 3 months ago
- all credits go to @mgeeky☆64Updated 3 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆19Updated 3 years ago
- ☆82Updated 3 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- ☆51Updated 5 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆23Updated 5 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- ☆62Updated 3 years ago