almounah / evil-goLinks
A fork of the Go language with some tweaks
☆54Updated 7 months ago
Alternatives and similar repositories for evil-go
Users that are interested in evil-go are comparing it to the libraries listed below
Sorting:
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 6 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆233Updated 2 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆119Updated 2 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆69Updated 2 weeks ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆87Updated 8 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆79Updated 6 months ago
- Fast context enumeration for newly obtained Active Directory credentials.☆79Updated 3 weeks ago
- ☆162Updated 4 months ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆76Updated 2 weeks ago
- Speedy probe-based UDP service scanner☆96Updated 3 months ago
- C2 writen in Rust & Go powered by Tor network.☆137Updated last month
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆67Updated last month
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆58Updated last month
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆76Updated 3 weeks ago
- .NET tool used to enrich RPC telemetry☆100Updated 3 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆83Updated 2 weeks ago
- Rebuild of portspoof in GO with additional features.☆19Updated last week
- ☆43Updated 2 months ago
- Backdooring VSCode Projects☆79Updated 3 months ago
- Dump Linux keyrings☆20Updated last year
- PoC that downloads an executable from a public SSL certificate☆128Updated last month
- BOF to decrypt Signal Desktop chat logs☆71Updated 7 months ago
- Persist like a Dodder☆64Updated 4 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆116Updated 3 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 8 months ago
- Deploy a phishing infrastructure on the fly.☆75Updated 9 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated 8 months ago
- Adversary Emulation Framework☆123Updated 2 months ago
- Lifetime AMSI bypass.☆35Updated 5 months ago