guitmz / go-lioraView external linksLinks
Probably the first binary (PE/ELF) infector ever created in GoLang.
☆50May 12, 2022Updated 3 years ago
Alternatives and similar repositories for go-liora
Users that are interested in go-liora are comparing it to the libraries listed below
Sorting:
- Finding code caves in ELF files with GoLang☆26Jan 15, 2018Updated 8 years ago
- Small tool to run ELF binaries from memory with a given process name☆172Oct 6, 2021Updated 4 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- single-threaded event driven sleep obfuscation poc for linux☆37Jun 14, 2025Updated 8 months ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Dec 25, 2021Updated 4 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- tiny wrapper around Windows Management Instrumentation API☆13Nov 9, 2018Updated 7 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- DNS server for pentesters☆50Nov 2, 2025Updated 3 months ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated last month
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Reflectively load PE☆105Aug 4, 2020Updated 5 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Feb 23, 2020Updated 5 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Fileless persistence, attacks and anti-forensic capabilties.☆92Dec 6, 2018Updated 7 years ago
- Viper is a brute-force password cracker.☆24Feb 10, 2016Updated 10 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Nov 20, 2015Updated 10 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆94Apr 27, 2019Updated 6 years ago
- Framework for C# development☆71Feb 2, 2026Updated 2 weeks ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Jul 23, 2020Updated 5 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Nov 19, 2024Updated last year
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- Totally self-contained SSH reverse tunnel written in Go☆83Mar 12, 2021Updated 4 years ago
- A C# DLL Wrapper Generator☆11Feb 23, 2022Updated 3 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago