almounah / evil-goLinks
A fork of the Go language with some tweaks
☆51Updated 4 months ago
Alternatives and similar repositories for evil-go
Users that are interested in evil-go are comparing it to the libraries listed below
Sorting:
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 3 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆64Updated this week
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆41Updated last week
- IPSpinner works as a local proxy that redirects requests through external services.☆63Updated 3 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆36Updated 2 weeks ago
- Find what egress ports are allowed☆42Updated 2 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆54Updated 11 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 4 months ago
- Tool to aid in dumping LSASS process remotely☆40Updated 11 months ago
- Rebuild of portspoof in GO with additional features.☆18Updated this week
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆147Updated 2 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆64Updated 9 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆129Updated 7 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆129Updated 2 months ago
- ☆52Updated 4 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆81Updated 9 months ago
- Python tool to interact with WMI StdRegProv☆58Updated 7 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆57Updated last month
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆165Updated 2 weeks ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 11 months ago
- Java archive implant toolkit.☆61Updated 2 months ago
- Simple C2 using GitHub repository as comms channel.☆31Updated 8 months ago
- Persist like a Dodder☆61Updated last month
- Indirect Syscall with TartarusGate Approach in Go☆121Updated 6 months ago
- BOF to decrypt Signal Desktop chat logs☆65Updated 4 months ago
- Exploits Unauth Docker API☆41Updated 2 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆92Updated 8 months ago
- .NET deserialization hunter☆77Updated 11 months ago
- ☆59Updated 8 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year