ayoul3 / reflect-pe
Reflectively load PE
☆103Updated 4 years ago
Alternatives and similar repositories for reflect-pe:
Users that are interested in reflect-pe are comparing it to the libraries listed below
- Reflective DLL loading of your favorite Golang program☆168Updated 5 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆41Updated 2 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆112Updated 3 years ago
- Go implementation of the Heaven's Gate technique☆98Updated 4 years ago
- A PoC package for hosting the CLR and executing .NET from Go☆73Updated 9 months ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆65Updated 11 months ago
- Demo of process injection, using Nt, direct syscall, etc.☆28Updated 3 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆124Updated 2 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Updated 4 years ago
- ☆56Updated 4 years ago
- Cobalt Strike BOF Files with Nim!☆84Updated 2 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆140Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- ☆18Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆60Updated 4 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Updated 5 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆118Updated 3 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆21Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆101Updated 3 years ago
- Allow a Go process to dynamically load .NET assemblies☆148Updated 5 years ago
- Golng version of SharpDump that can be used to extract LSASS or any other proces. Provides token elevation prior to creating dump of high…☆21Updated 4 years ago
- Golang evasion tool, execute-assembly .Net file☆97Updated 3 years ago
- SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.☆90Updated 4 years ago
- RDI implementation in Nim☆64Updated 4 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆16Updated 3 years ago
- MacOS C2 Framework☆83Updated 3 years ago
- PoC to interact with local/remote registry hives through WMI☆85Updated 4 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆94Updated 3 years ago
- ☆145Updated 2 years ago