post exploitation user monitoring tool
☆20Jul 3, 2018Updated 7 years ago
Alternatives and similar repositories for GoRedSpy
Users that are interested in GoRedSpy are comparing it to the libraries listed below
Sorting:
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- Iterate over Windows Handles☆15Nov 18, 2025Updated 3 months ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- ☆18Aug 15, 2021Updated 4 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆23Jun 22, 2020Updated 5 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- Go implementation of the Heaven's Gate technique☆102Feb 11, 2021Updated 5 years ago
- ARP ping detector on local network☆15Feb 3, 2013Updated 13 years ago
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Jan 18, 2024Updated 2 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Stealth Kid RAT (SKR) is an open-source multi-platform Remote Access Trojan (RAT) written in C#. Released under MIT license. The SKR proj…☆23Sep 16, 2021Updated 4 years ago
- DNS server for pentesters☆50Nov 2, 2025Updated 3 months ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆129Apr 24, 2022Updated 3 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- ☆81Dec 24, 2021Updated 4 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- A logging ASKPASS binary☆29May 29, 2020Updated 5 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Identify web application versions☆18Apr 14, 2017Updated 8 years ago
- Vulnerable docker images for CVE-2021-41773☆23Oct 6, 2021Updated 4 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- bypass UAC even when configured to always notify user☆29Aug 31, 2021Updated 4 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- A repo full of example gscripts☆102Sep 6, 2019Updated 6 years ago
- golang rpc框架,支持数据加密传输☆13Feb 19, 2026Updated last week
- A flexible tool that creates a minidump of the LSASS process☆14Jan 18, 2022Updated 4 years ago
- ☆17Apr 6, 2021Updated 4 years ago