kaftejiman / ejjaLinks
A modular Go source code level control flow obfuscator, made in Go.
☆37Updated 4 years ago
Alternatives and similar repositories for ejja
Users that are interested in ejja are comparing it to the libraries listed below
Sorting:
- Put sandbox detection to bed. Advanced sandbox detection and evasion for Golang.☆8Updated 3 years ago
- Encrypt embedded go files using age.☆49Updated 3 years ago
- Package that provides different PE tricks to difficult the reverse engineering of your Windows applications.☆11Updated 5 years ago
- A collection of weaponized LPE exploits written in Go☆52Updated 5 months ago
- golang String Obfuscate☆9Updated 3 years ago
- Windows API/constants, identity, and WinHTTP/WinINet for Go.☆18Updated last month
- ☆18Updated 3 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆41Updated 2 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Updated 4 years ago
- PE file mapping and manipulation package.☆36Updated 3 years ago
- ☆15Updated 2 years ago
- Thanks to @d35ha☆13Updated 3 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- Golang wrapper for the Microsoft Antimalware Scan Interface (AMSI)☆11Updated 3 years ago
- Go wrapper for in-memory DLL module loader, MemoryModule☆32Updated 7 years ago
- ☆27Updated 3 years ago
- ☆9Updated last year
- ☆14Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 2 years ago
- ☆45Updated 3 months ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆12Updated 3 years ago
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Updated last year
- Windows Persistence Collection☆12Updated 4 years ago
- Tool scan EternalBlue by golang☆22Updated 5 years ago
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Updated 4 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Updated 3 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- DPX - the Doge Packer for eXecutables☆29Updated 3 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- Read Memory without ReadProcessMemory for Current Process☆76Updated 3 years ago