golang-devops / go-psexecLinks
The plan is to have a replacement for psexec
☆32Updated 7 years ago
Alternatives and similar repositories for go-psexec
Users that are interested in go-psexec are comparing it to the libraries listed below
Sorting:
- Windows API/constants, identity, and WinHTTP/WinINet for Go.☆19Updated 3 weeks ago
- Reflectively load PE☆105Updated 5 years ago
- A Microsoft windows x86_64 Golang shellcode tester that includes example calc.exe shellcode.☆69Updated 7 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- Apache Module Backdoor (PoC)☆48Updated 6 years ago
- Kerberos TGS_REP cracker written in Golang☆57Updated 10 years ago
- ☆36Updated 6 years ago
- Allow a Go process to dynamically load .NET assemblies☆150Updated 5 years ago
- Hide Mimikatz From Process Lists☆19Updated 10 years ago
- interesting analysis☆16Updated 7 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32Updated 10 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Updated 6 years ago
- ☆33Updated 5 years ago
- Shellcode library as a Go package☆70Updated 6 years ago
- Shellcode process injector☆28Updated 5 years ago
- Leak windows system info through a docx file☆12Updated 5 years ago
- Go wrapper for in-memory DLL module loader, MemoryModule☆32Updated 7 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆76Updated 6 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Updated 5 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Updated 3 years ago
- Linux AV tests☆13Updated 6 years ago
- 获取系统KB补丁对于的MS号☆24Updated 6 years ago
- Reverseshell Generator☆10Updated 8 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Updated 7 years ago
- An example of a downloader written in NodeJS.☆24Updated 4 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Updated 6 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Updated 7 years ago
- Chrome cookie dumper☆18Updated 5 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆40Updated 2 years ago