hasherezade / pesieve-go
Golang bindings for PE-sieve
☆43Updated last year
Alternatives and similar repositories for pesieve-go
Users that are interested in pesieve-go are comparing it to the libraries listed below
Sorting:
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- Ghosting-AMSI☆17Updated 2 weeks ago
- ☆48Updated last year
- example using NtCreateUserProcess in rust☆19Updated 3 months ago
- various methods of making API calls☆17Updated 3 months ago
- Linux Sleep Obfuscation☆97Updated last year
- The AMSI server for Avred☆29Updated last year
- A work in progress BOF/COFF loader in Rust☆48Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆25Updated 11 months ago
- ☆24Updated 3 months ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- It's what all the kids are talking about☆12Updated 2 years ago
- ☆34Updated last month
- Attack chain emulator. Write recipes for initial access easily☆20Updated 2 months ago
- Sample Rust Hooking Engine☆36Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- Unpacker for donut shellcode☆17Updated 4 years ago
- Python module for running BOFs☆70Updated last year
- ☆28Updated 11 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆37Updated last year
- ☆55Updated 6 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆39Updated 4 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 6 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- EvtPsst☆53Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago