idfp / go-stealerLinks
Cookie & Logins stealer for Firefox + Chrome, demonstration only
☆12Updated 2 years ago
Alternatives and similar repositories for go-stealer
Users that are interested in go-stealer are comparing it to the libraries listed below
Sorting:
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆147Updated 11 months ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆115Updated last week
- A POC to disable TamperProtection and other Defender / MDE components☆250Updated last year
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆78Updated last year
- Dynamic shellcode loader with sophisticated evasion capabilities☆274Updated 2 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 9 months ago
- execute PE in memory Filelessly☆50Updated 10 months ago
- The best powershell obfuscator ever made☆120Updated 4 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year
- ☆164Updated 9 months ago
- C2 writen in Rust & Go powered by Tor network.☆151Updated last month
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆133Updated last year
- Collection of red team techniques.☆64Updated 8 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 8 months ago
- Evasive Golang Loader☆138Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆181Updated 9 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆102Updated 3 years ago
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆119Updated last week
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆135Updated last year
- RunPE implementation with multiple evasive techniques☆256Updated 3 months ago
- Chrome browser extension-based Command & Control☆224Updated 5 months ago
- Amazing whoami alternatives☆142Updated last year
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆186Updated 8 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆181Updated 2 years ago
- A guide to modern exploit development, shellcode, EDR and WAF bypass, and initial Red Team access.☆22Updated 3 weeks ago
- ☆163Updated 2 years ago
- 「💀」Proof of concept on BYOVD attack☆165Updated last year
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Updated last year