almounah / evil-goLinks
A fork of the Go language with some tweaks
☆50Updated 5 months ago
Alternatives and similar repositories for evil-go
Users that are interested in evil-go are comparing it to the libraries listed below
Sorting:
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 4 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆64Updated 3 weeks ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆189Updated 2 weeks ago
- Simple C2 using GitHub repository as comms channel.☆31Updated 8 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆59Updated last month
- IPSpinner works as a local proxy that redirects requests through external services.☆68Updated 3 months ago
- C2 writen in Rust & Go powered by Tor network.☆106Updated last week
- Java archive implant toolkit.☆61Updated 2 months ago
- Find what egress ports are allowed☆42Updated 2 years ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆130Updated 8 months ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆54Updated last year
- Speedy probe-based UDP service scanner☆89Updated 3 weeks ago
- ☆109Updated 8 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆42Updated last month
- Utilizng an MCP Server to communicate with your C2☆75Updated 2 months ago
- Tool to aid in dumping LSASS process remotely☆40Updated 11 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆65Updated 9 months ago
- Rebuild of portspoof in GO with additional features.☆18Updated this week
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆124Updated last year
- Indirect Syscall with TartarusGate Approach in Go☆124Updated last week
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆55Updated 7 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆42Updated last week
- Active Directory Authentication Library☆77Updated last week
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆48Updated 4 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆121Updated 2 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆50Updated last year
- ☆52Updated 5 months ago
- A red teaming attack paradigm against AI Agents☆31Updated 4 months ago