kerbyj / goLazagneLinks
Go library for credentials recovery
☆224Updated 3 years ago
Alternatives and similar repositories for goLazagne
Users that are interested in goLazagne are comparing it to the libraries listed below
Sorting:
- Really stupid re-implementation of invoke-wmiexec☆217Updated 2 years ago
- Windows UAC bypass techniques implemented and written in Go☆215Updated 3 years ago
- Automatic ProxyShell Exploit☆115Updated 4 years ago
- SonicWall SSL-VPN Exploit☆183Updated 4 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆192Updated 3 years ago
- A backdoor module for Apache2☆200Updated 5 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆166Updated 4 years ago
- Domain Borrowing PoC☆216Updated 4 years ago
- ☆163Updated 3 years ago
- ☆297Updated last year
- Another Go Shellcode Loader using Windows APIs☆140Updated 4 years ago
- Automatically spawn a reverse shell fully interactive for Linux or Windows victim☆355Updated 2 years ago
- ProxyLogon Pre-Auth SSRF To Arbitrary File Write☆125Updated 2 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆231Updated 5 years ago
- It's the C version of https://github.com/mthbernardes/sshLooter☆270Updated 2 years ago
- Use to build an anonymous SMB file server.☆232Updated 4 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆356Updated 3 years ago
- a patched sshd for red team activities☆84Updated 4 years ago
- ☆386Updated 4 years ago
- Post-exploitation agent for Merlin☆202Updated 8 months ago
- ☆215Updated 2 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆204Updated last year
- Check, exploit, generate class, obfuscate, TLS, ACME about log4j2 vulnerability in one Go program.☆57Updated 4 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆214Updated 3 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆493Updated 4 years ago
- Programmatically create an administrative user under Windows☆187Updated 8 years ago
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 4 years ago
- ☆170Updated 4 years ago
- Behinder source code☆171Updated 4 years ago
- A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impers…☆161Updated 3 years ago