kerbyj / goLazagne
Go library for credentials recovery
☆216Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for goLazagne
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆312Updated 2 years ago
- Really stupid re-implementation of invoke-wmiexec☆212Updated last year
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆187Updated 4 months ago
- Windows UAC bypass techniques implemented and written in Go☆211Updated 2 years ago
- Universal Shared Library User-space Loader☆216Updated 2 years ago
- ☆157Updated 2 years ago
- Post-exploitation agent for Merlin☆182Updated 3 weeks ago
- SonicWall SSL-VPN Exploit☆174Updated 3 years ago
- Dump ntds.dit really fast☆367Updated 3 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆477Updated 3 years ago
- Another Go Shellcode Loader using Windows APIs☆139Updated 3 years ago
- ☆289Updated 4 months ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆143Updated 2 years ago
- A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.☆611Updated 2 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆227Updated 4 years ago
- Domain Borrowing PoC☆209Updated 3 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆186Updated 2 years ago
- RCE for old gitlab version <= 11.4.7 & 12.4.0-12.8.1 and LFI for old gitlab versions 10.4 - 12.8.1☆158Updated 3 years ago
- Automatic ProxyShell Exploit☆114Updated 3 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆264Updated 2 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆481Updated 2 years ago
- Automatically spawn a reverse shell fully interactive for Linux or Windows victim☆352Updated last year
- Resources About Cobalt Strike. 100+ Tools And 200+ Posts.☆245Updated 4 years ago
- Some Attacks of Exchange SSRF ProxyLogon&ProxyShell☆166Updated 3 years ago
- IOXIDResolver.py from AirBus Security☆217Updated last year
- A super small jsp webshell with file upload capabilities.☆289Updated 3 years ago
- Cobalt Strike Python API☆292Updated 2 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆456Updated 2 years ago
- Programmatically create an administrative user under Windows☆178Updated 7 years ago
- ☆378Updated 3 years ago