kerbyj / goLazagneLinks
Go library for credentials recovery
☆223Updated 3 years ago
Alternatives and similar repositories for goLazagne
Users that are interested in goLazagne are comparing it to the libraries listed below
Sorting:
- Really stupid re-implementation of invoke-wmiexec☆217Updated 2 years ago
- Windows UAC bypass techniques implemented and written in Go☆213Updated 3 years ago
- SonicWall SSL-VPN Exploit☆184Updated 4 years ago
- Automatic ProxyShell Exploit☆113Updated 4 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆162Updated 3 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆347Updated 3 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆190Updated 3 years ago
- ☆161Updated 3 years ago
- It's the C version of https://github.com/mthbernardes/sshLooter☆268Updated 2 years ago
- Another Go Shellcode Loader using Windows APIs☆141Updated 3 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆232Updated 5 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆205Updated last year
- Post-exploitation agent for Merlin☆200Updated 5 months ago
- A backdoor module for Apache2☆198Updated 5 years ago
- ☆296Updated last year
- Domain Borrowing PoC☆216Updated 4 years ago
- NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473☆163Updated 4 years ago
- ProxyLogon Pre-Auth SSRF To Arbitrary File Write☆124Updated last year
- ☆387Updated 4 years ago
- Windows Defender ShellCode Execution Bypass☆129Updated 5 years ago
- Automatically spawn a reverse shell fully interactive for Linux or Windows victim☆353Updated 2 years ago
- Programmatically create an administrative user under Windows☆183Updated 8 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆491Updated 4 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆118Updated 5 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆213Updated 3 years ago
- Dump ntds.dit really fast☆405Updated 4 years ago
- Exploit to SYSTEM for CVE-2021-21551☆235Updated 4 years ago
- ☆170Updated 4 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆252Updated 4 years ago
- ☆215Updated 2 years ago