Synzack / Go-Syscall-Examples
Simple PoCs for utilizing Windows syscalls in Go
☆15Updated 4 years ago
Alternatives and similar repositories for Go-Syscall-Examples:
Users that are interested in Go-Syscall-Examples are comparing it to the libraries listed below
- ☆18Updated 3 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- Thanks to @d35ha☆13Updated 3 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- golang implementation of Syswhisper2/Syswhisper3☆23Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 2 years ago
- Proof of concept SMB C2 using named pipes in Golang☆25Updated 5 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆39Updated 4 years ago
- Savoir is a tool to perform tasks during internal security assessment☆19Updated 2 years ago
- Windows Persistence Collection☆12Updated 3 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆41Updated last year
- ☆29Updated 2 years ago
- A simple BOF implementation of klist using Windows API☆30Updated 2 years ago
- ☆11Updated 2 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆30Updated 3 years ago
- x64 version☆30Updated 3 years ago
- Beacon Object Files.☆35Updated 11 months ago
- BOF/COFF obj file to PIC(shellcode). by golang☆37Updated 2 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Updated 3 years ago
- Tool scan EternalBlue by golang☆22Updated 5 years ago
- ☆36Updated 4 years ago
- Pure Go lang cryptor and shellcode injector☆20Updated 3 years ago
- EDR Evasion - Combination of SwampThing - TikiTorch☆24Updated 4 years ago
- This project is created for research into antivirus evasion by unhooking.☆15Updated 3 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆33Updated 2 years ago
- ☆19Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆11Updated 5 months ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Updated 3 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆42Updated last year
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year