hillu / go-ntdll
Go interface to NTDLL functions
☆74Updated 11 months ago
Alternatives and similar repositories for go-ntdll:
Users that are interested in go-ntdll are comparing it to the libraries listed below
- Process injection techniques written in Go.☆62Updated last year
- Minimal PoC developed as discuss in https://captmeelo.com/redteam/maldev/2022/05/10/ntcreateuserprocess.html☆134Updated 2 years ago
- A PoC package for hosting the CLR and executing .NET from Go☆71Updated 8 months ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆59Updated 4 years ago
- Go implementation of the Heaven's Gate technique☆97Updated 4 years ago
- WinAPI DllMain() and its hook in Golang. To build & run in bash: $ make☆22Updated 6 years ago
- A library to make HTTP requests with the Windows winhttp API☆23Updated last year
- bring your own vulnerable driver☆92Updated last year
- Process Injection Techniques with Golang☆76Updated 4 years ago
- ProcessGhosting 技术的 rust 实现版本☆25Updated 5 months ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆109Updated 3 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆133Updated 2 years ago
- Windows API Call Obfuscation☆99Updated 2 years ago
- Reflectively load PE☆102Updated 4 years ago
- Get your data from the resource section manually, with no need for windows apis☆59Updated 5 months ago
- Load a dynamic library from memory by modifying the native Windows loader☆211Updated 2 months ago
- LdrLoadDll Unhooking☆129Updated 3 years ago
- execute a PE in the address space of another PE aka process hollowing☆55Updated 3 years ago
- Fork of Wireguard's Memmod☆16Updated 2 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆78Updated 3 years ago
- This project will guide yout to awareness of injection in almost every window API and process.☆24Updated 3 years ago
- ☆69Updated last month
- Golang packer that use process hollowing☆17Updated 2 years ago
- Use hardware breakpoints to spoof the call stack for both syscalls and API calls☆190Updated 9 months ago
- Unpacker for donut shellcode☆17Updated 4 years ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆118Updated last year
- Load and execute a common object file format (COFF) in the current process☆28Updated last year
- Allow a Go process to dynamically load .NET assemblies☆148Updated 5 years ago
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆100Updated 2 years ago