hasherezade / pesieve-goLinks
Golang bindings for PE-sieve
☆43Updated last year
Alternatives and similar repositories for pesieve-go
Users that are interested in pesieve-go are comparing it to the libraries listed below
Sorting:
- ☆37Updated 2 years ago
- ☆18Updated last year
- Ghosting-AMSI☆17Updated last month
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- ☆27Updated 7 months ago
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- A simple Linux in-memory .so loader☆30Updated 2 years ago
- Unpacker for donut shellcode☆17Updated 5 years ago
- Malware Analysis tools☆26Updated 9 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Identifies metadata of .NET binary files.☆21Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- Attack chain emulator. Write recipes for initial access easily☆20Updated 4 months ago
- ☆24Updated 4 months ago
- Python module for running BOFs☆70Updated last year
- miscellaneous codes☆35Updated last year
- ☆48Updated 2 years ago
- example using NtCreateUserProcess in rust☆19Updated 5 months ago
- A Multi-Threaded PE Export Collection Utility☆14Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆26Updated last year
- It's what all the kids are talking about☆12Updated 2 years ago
- ☆26Updated 4 months ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆14Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆39Updated 5 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆22Updated 2 years ago
- Repo containing my public talks☆23Updated 2 years ago