almounah / evil-goLinks
A fork of the Go language with some tweaks
☆54Updated 11 months ago
Alternatives and similar repositories for evil-go
Users that are interested in evil-go are comparing it to the libraries listed below
Sorting:
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆121Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 10 months ago
- Caddy v2 module to filter requests based on C2 profiles☆46Updated 9 months ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Updated last year
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆64Updated 7 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆430Updated 3 months ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆263Updated last month
- Simple C2 using GitHub repository as comms channel.☆31Updated last year
- Monarch - The Adversary Emulation Toolkit☆63Updated last year
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆77Updated last week
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆131Updated 4 months ago
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆128Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆104Updated 4 months ago
- Indirect Syscall with TartarusGate Approach in Go☆133Updated 6 months ago
- Dump Linux keyrings☆23Updated last year
- Find what egress ports are allowed☆46Updated 2 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 10 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Updated last year
- PoC that downloads an executable from a public SSL certificate☆135Updated 5 months ago
- Speedy probe-based UDP service scanner☆117Updated 3 months ago
- ☆163Updated 2 months ago
- Tool to aid in dumping LSASS process remotely☆42Updated 4 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Updated last month
- Java archive implant toolkit.☆61Updated 9 months ago
- Enumerate active EDR's on the system☆148Updated 4 months ago
- Python tool to interact with WMI StdRegProv☆60Updated last year
- A red teaming attack paradigm against AI Agents☆32Updated 10 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Updated 5 months ago
- ☆53Updated 11 months ago
- Fast context enumeration for newly obtained Active Directory credentials.☆85Updated 5 months ago