alexfrancow / offensive-vlangLinks
POCs to test Vlang in cybersecurity aspects.
☆37Updated 2 years ago
Alternatives and similar repositories for offensive-vlang
Users that are interested in offensive-vlang are comparing it to the libraries listed below
Sorting:
- Offensive V Programming☆18Updated 3 years ago
- Run python from a single exe☆35Updated 3 years ago
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Updated 4 years ago
- ShellcodeFluctuation PoC ported to Nim☆78Updated 2 years ago
- A collection of offensive Nim example code☆75Updated 3 years ago
- Ntdll Unhooking POC☆19Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆63Updated 4 years ago
- ☆13Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 2 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 4 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- HookDetection☆46Updated 3 years ago
- Cobalt Strike BOF Files with Nim!☆86Updated 3 years ago
- Classic Bofa adapted to CobaltStrike.☆11Updated 2 years ago
- Some Cyber Security related scripts☆18Updated 2 years ago
- This project is created for research into antivirus evasion by unhooking.☆18Updated 4 years ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆67Updated last year
- Simple PoCs for utilizing Windows syscalls in Go☆16Updated 4 years ago
- ☆10Updated 2 years ago
- ☆30Updated 2 years ago
- Small utility package for manipulating Windows process tokens☆26Updated 3 years ago
- ☆18Updated 4 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- A collection of C# utilities intended to be used with Cobalt Strike's execute-assembly☆48Updated 2 years ago
- Direct system calls by nim☆14Updated 3 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Updated 4 years ago
- Persistence via Shell Extensions☆62Updated 2 years ago
- ☆56Updated 2 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- A simple BOF implementation of klist using Windows API☆32Updated 3 years ago