akkuman / go-dll-evil
有关 dll 转发的 golang windows 恶意代码示例
☆79Updated 3 years ago
Alternatives and similar repositories for go-dll-evil:
Users that are interested in go-dll-evil are comparing it to the libraries listed below
- Go实现部分Rubeus功能,可执行asktgt, asktgs, s4u, describe ticket, renew ticket, asreproast等☆141Updated 2 years ago
- golang for socks5☆33Updated 3 years ago
- [windows]pe -> shellcode -> shellcodeLoader -> (pe2shellcode go on?)☆76Updated 3 years ago
- 窃取当前用户的ssh,sudo密码☆69Updated 2 years ago
- A mininal go http client for security testing☆47Updated 2 months ago
- 一个基于DNS隧道的简单C2☆59Updated 2 years ago
- 魔改shadowsocks,实现socks5内网穿透。☆62Updated last year
- PrintSpoofer的反射dll实现,结合Cobalt Strike 使用☆88Updated 3 years ago
- 修改自geacon的多功能linux运维管理工具☆61Updated 4 years ago
- Csharp 反射加载dll☆40Updated 3 years ago
- Pty bind shell for golang 一款基于SSH协议的远控程序☆50Updated 3 years ago
- CrossC2通信协议API实现☆84Updated 3 years ago
- An EternalBlue exploit implementation in pure go☆95Updated 4 years ago
- 轻便的恶意反代☆48Updated 3 years ago
- webshell manager libraries | 网站管理工具☆125Updated 2 years ago
- 通过windows的DCOM接口进行网卡进行信息枚举,无需认证,只要目标的135端口开放即可获得信息。可以有效提高内网渗透的效率,定位多网卡主机。☆95Updated last year
- 调用x64dbg中的loadll.exe白加黑示例代码☆61Updated 10 months ago
- Golang 版SigThief☆75Updated 3 years ago
- ☆3Updated 2 years ago
- hyscan HengGe Team☆68Updated 3 years ago
- Golang implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆26Updated 3 years ago
- 连接eval一句话webshell,获得可交互的虚拟终端☆97Updated 2 years ago
- PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。☆148Updated 3 years ago
- (批量化改造)sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。☆107Updated 4 years ago
- 使用go语言实现nc的命令执行, 完美解决tcp粘包☆93Updated 2 years ago
- A useful file search tool☆58Updated 2 years ago
- ☆33Updated last year
- windows task scheduler in golang☆29Updated 3 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆148Updated 3 years ago
- A decentralized basic Trojan framework that eliminates C2 mode and is implemented by P2P, the core networking technology of blockchain☆34Updated last year