kmahyyg / go-rawcopyLinks
RawCopy - Golang implementation
☆24Updated 2 years ago
Alternatives and similar repositories for go-rawcopy
Users that are interested in go-rawcopy are comparing it to the libraries listed below
Sorting:
- Fork & modify of Wireguard's Memmod☆33Updated 2 years ago
- AddDefenderExclusions Beacon Object File☆40Updated 2 years ago
- ☆10Updated last year
- Bypass EDR Create TaskServers☆37Updated 2 years ago
- MSSQL CLR for pentest.☆55Updated 2 years ago
- ☆42Updated last year
- Self Cleanup in post-ex job☆59Updated last year
- ☆24Updated 4 months ago
- load assembly executable file in memory☆41Updated 2 years ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆50Updated 2 years ago
- A little tool to play with Windows security☆12Updated last month
- 一个demo☆24Updated last year
- Code with Windows Hacker☆12Updated 2 years ago
- ☆19Updated 3 years ago
- Its a coff loader ported to go( Modified by TimWhite )☆27Updated 2 years ago
- A BOF/COFF loader implemented in Go and CGO.☆22Updated last year
- Golang implementation of Reflective load PE from memory☆62Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆52Updated 2 years ago
- Golang implement winrm client with pass the hash☆32Updated last year
- Beacon compiled using clang☆71Updated 2 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆67Updated 3 years ago
- ☆30Updated 2 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆44Updated 3 years ago
- vehsyscall:a syscall project that may bypass EDR☆58Updated last year
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆24Updated 4 years ago
- command execute without 445 port☆52Updated 3 years ago
- ☆31Updated last year
- ReturnGate, just like HellsGate.☆68Updated 3 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆55Updated last year