guitmz / ezuri
A Simple Linux ELF Runtime Crypter
☆240Updated last month
Alternatives and similar repositories for ezuri:
Users that are interested in ezuri are comparing it to the libraries listed below
- Elf binary infector written in Go.☆208Updated 2 months ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆373Updated 3 years ago
- Injects additional machine instructions into various binary formats.☆277Updated last year
- bdvl☆113Updated 3 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆483Updated 4 years ago
- Golang PE injection on windows☆167Updated 3 years ago
- Small tool to run ELF binaries from memory with a given process name☆162Updated 3 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆499Updated 2 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆330Updated 2 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆195Updated 9 months ago
- Post-exploitation agent for Merlin☆192Updated 5 months ago
- Fork of pkg/debug that adds some additional functionality.☆123Updated last year
- Execute ELF files without dropping them on disk☆491Updated 9 months ago
- Golang anti-vm framework for Red Team and Pentesters☆128Updated last year
- A modular C2 framework☆448Updated 2 months ago
- ☆300Updated last year
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- Universal Shared Library User-space Loader☆225Updated 2 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆229Updated 4 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Updated last year
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆400Updated 8 months ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆227Updated 3 months ago
- 🕳 godoh - A DNS-over-HTTPS C2☆774Updated last year
- ☆266Updated 2 years ago
- Linux kernel rootkit☆338Updated last month
- Apply a filter to the events being reported by windows event logging☆261Updated 3 years ago
- A way to delete a locked file, or current running executable, on disk.☆520Updated 8 months ago
- Dump ntds.dit really fast☆390Updated 3 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆183Updated last year
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆169Updated 12 years ago