bluesentinelsec / OffensiveGoLang
A collection of Offensive Go packages.
☆213Updated 3 years ago
Alternatives and similar repositories for OffensiveGoLang
Users that are interested in OffensiveGoLang are comparing it to the libraries listed below
Sorting:
- A collection of offensive Go packages inspired by different Go repositories.☆242Updated 6 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆388Updated last year
- Malware development for red teaming workshop☆219Updated 3 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆144Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆386Updated last month
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆743Updated last year
- a tool to help operate in EDRs' blind spots☆730Updated 5 months ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆280Updated 2 years ago
- XLL Phishing Tradecraft☆421Updated 2 years ago
- easy-to-use payload hosting☆270Updated 3 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆329Updated 3 weeks ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆195Updated this week
- Infrastructure Automation☆346Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆488Updated 2 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆424Updated 2 years ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆294Updated this week
- Nim-based assembly packer and shellcode loader for opsec & profit☆476Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆331Updated 6 months ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Updated last year
- ☆408Updated last year
- ☆196Updated 5 years ago
- ☆385Updated 4 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆310Updated 8 months ago
- ☆188Updated 2 years ago
- ☆72Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆395Updated 4 months ago
- ☆143Updated last month
- Materials for the workshop "Red Team Ops: Havoc 101"☆375Updated 7 months ago