akkuman / gSigFlip
A SigFlip implement in golang
☆46Updated 3 years ago
Alternatives and similar repositories for gSigFlip:
Users that are interested in gSigFlip are comparing it to the libraries listed below
- DPX - the Doge Packer for eXecutables☆27Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆37Updated 2 years ago
- Command line interface for (running) BOFs☆42Updated last month
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated last year
- Learning notes of amazing Sliver C2 project.☆25Updated last year
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 2 years ago
- ☆39Updated last year
- Cs-Sleep-Mask-Fiber☆17Updated 5 months ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆19Updated 2 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆50Updated last year
- Golang implementation of Reflective load PE from memory☆61Updated 3 years ago
- 一款利用某云厂商的物联网平台作为c2的框架☆23Updated last year
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆44Updated last year
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- Evasive loader to bypass static detection☆56Updated last year
- Golang implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆25Updated 3 years ago
- Loader that loads shellcode from UUID's☆22Updated 4 years ago
- ☆19Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆80Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆15Updated last year
- desktop screenshot☆29Updated last year
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆79Updated 2 years ago
- load assembly executable file in memory☆38Updated last year
- Hide Port In Windows☆38Updated 3 months ago
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆18Updated 8 months ago
- EventViewer Bypass Uac Bof☆17Updated 2 years ago
- ScareCrow loader binary source which easier to read and learn☆25Updated 2 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆30Updated 7 months ago