kmahyyg / go-rawcopyView external linksLinks
RawCopy - Golang implementation
☆24Oct 27, 2022Updated 3 years ago
Alternatives and similar repositories for go-rawcopy
Users that are interested in go-rawcopy are comparing it to the libraries listed below
Sorting:
- ☆11Sep 30, 2023Updated 2 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- easy dll proxying in go☆14Apr 24, 2022Updated 3 years ago
- 利用chrome扩展 dump 浏览器cookie https://saucer-man.com/information_security/787.html☆15Sep 9, 2021Updated 4 years ago
- ☆14Aug 22, 2022Updated 3 years ago
- Harmonizing N8N, NocoDB, One-API, and Fastchat to forge an accessible and intuitive AI flows integration platform. ⚡ 融合N8N、NocoDB、One-AP…☆11Jan 5, 2024Updated 2 years ago
- Beacon Object File (BOF) Template☆62Feb 6, 2026Updated last week
- GoLang sys全端口扫描☆13Jan 25, 2022Updated 4 years ago
- GitHub API Data Gatherer, Supports multi-token rotation, deep fetching, field filtering, and linked requests. Built as a proxy to the off…☆13Jan 5, 2024Updated 2 years ago
- Hide Port In Windows☆42Oct 24, 2024Updated last year
- 一种安全加密数据的方式,数据可以实现自校验,防止数据损坏和篡改(A way to securely encrypt data, the data can be self-verified to prevent data damage and tampering)☆64Dec 16, 2023Updated 2 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- Alibab Nacos Unauthorized Login☆14Mar 16, 2023Updated 2 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 5 months ago
- 利用NTLM Hash读取Exchange邮件☆58May 13, 2023Updated 2 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆187Oct 3, 2021Updated 4 years ago
- indirect syscalls for AV/EDR evasion in Go assembly☆365Jun 13, 2023Updated 2 years ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆32Oct 22, 2024Updated last year
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆55Jul 1, 2023Updated 2 years ago
- 一个以fuzz为中心思想的被动扫描工具☆161Dec 26, 2023Updated 2 years ago
- ☆20Aug 19, 2019Updated 6 years ago
- 看雪 LLVM与代码混淆技术 笔记☆23Aug 31, 2023Updated 2 years ago
- AddDefenderExclusions Beacon Object File☆41Jun 25, 2023Updated 2 years ago
- One WSL BOF to rule them all☆151Jan 14, 2026Updated last month
- create schtasks bypass AV☆23Jul 14, 2024Updated last year
- cobaltstrike4.5版本破/解、去除checksum8特征、bypass BeaconEye、修复错误路径泄漏stage、增加totp双因子验证、修复CVE-2022-39197等☆48Sep 22, 2022Updated 3 years ago
- ☆41Jul 10, 2023Updated 2 years ago
- 轻便的恶意反代☆48May 29, 2021Updated 4 years ago
- Bringing Shikata ga nai to the front html☆23Apr 28, 2022Updated 3 years ago
- use shellcode as asm function☆23Mar 29, 2022Updated 3 years ago
- A Socks5 proxy that encapsulates Socks5 in other security protocols☆90Dec 19, 2023Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- Go implementation of the self-deletion of an running executable from disk☆113Jun 6, 2023Updated 2 years ago
- ☆100Oct 27, 2023Updated 2 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆301Sep 28, 2021Updated 4 years ago
- Tool to remove all versions of Sophos AV\Endpoint Defense☆27Mar 18, 2023Updated 2 years ago
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- 探测只有绑 定指定IP才能访问的域名,主要用于信息收集使用.☆24Jun 27, 2023Updated 2 years ago