kerbyj / goLazagne
Go library for credentials recovery
☆218Updated 2 years ago
Alternatives and similar repositories for goLazagne:
Users that are interested in goLazagne are comparing it to the libraries listed below
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆195Updated 8 months ago
- Really stupid re-implementation of invoke-wmiexec☆213Updated 2 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆482Updated 3 years ago
- Dump ntds.dit really fast☆390Updated 3 years ago
- SonicWall SSL-VPN Exploit☆173Updated 4 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆328Updated 2 years ago
- Windows UAC bypass techniques implemented and written in Go☆210Updated 2 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆229Updated 4 years ago
- ☆290Updated 8 months ago
- A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.☆615Updated 2 years ago
- Post-exploitation agent for Merlin☆189Updated 5 months ago
- Exploit to SYSTEM for CVE-2021-21551☆236Updated 3 years ago
- Automatic ProxyShell Exploit☆112Updated 3 years ago
- ☆379Updated 3 years ago
- Evading Anti-Virus with Unusual Technique☆211Updated 2 years ago
- Cobalt Strike Python API☆297Updated 3 years ago
- A backdoor module for Apache2☆196Updated 5 years ago
- Print Spooler Named Pipe Impersonation for Cobalt Strike☆262Updated 4 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆146Updated 3 years ago
- ☆159Updated 2 years ago
- Cobalt Strike kit for Persistence☆471Updated 5 years ago
- Golang reverse/bind shell generator☆229Updated 3 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆174Updated 4 years ago
- ☆166Updated 3 years ago
- Automatically spawn a reverse shell fully interactive for Linux or Windows victim☆355Updated last year
- Domain Borrowing PoC☆212Updated 3 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆286Updated 2 years ago
- Programmatically create an administrative user under Windows☆180Updated 8 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆274Updated 4 months ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆225Updated 3 years ago