A cross platform tool for verifying credentials and executing single commands
☆33Apr 19, 2019Updated 6 years ago
Alternatives and similar repositories for GoRedShell
Users that are interested in GoRedShell are comparing it to the libraries listed below
Sorting:
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- experimenting w/ apple script for various macOS functionality☆14Aug 4, 2019Updated 6 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- A Golang Registry parser☆19Feb 3, 2025Updated last year
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Competition Infrastructure Management☆88Nov 17, 2021Updated 4 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- ☆110May 14, 2018Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago
- PoC that manipulates Windows file times using SetFileTime() API☆63May 25, 2019Updated 6 years ago
- A golang library designed to interact with Metasploit☆43Mar 27, 2021Updated 4 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆380Aug 13, 2021Updated 4 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- Persistent twitter monitor tool for 2021 SANS OSINT Summit Talk☆18Mar 3, 2022Updated 3 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- A Microsoft windows x86_64 Golang shellcode tester that includes example calc.exe shellcode.☆69Apr 6, 2018Updated 7 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- Powershell Persistence Locator☆66Sep 11, 2016Updated 9 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- Selenium based web scraper to generate passwords list☆51May 7, 2020Updated 5 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- Smart overlay for Cobalt Strike PS function☆30Mar 9, 2019Updated 6 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆704Feb 24, 2024Updated 2 years ago
- ☆85May 19, 2015Updated 10 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Aug 21, 2018Updated 7 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago