kost / revsocksLinks
Reverse SOCKS5 implementation in Go
☆384Updated last year
Alternatives and similar repositories for revsocks
Users that are interested in revsocks are comparing it to the libraries listed below
Sorting:
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆455Updated last year
- Post-exploitation agent for Merlin☆201Updated 4 months ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆345Updated 2 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆515Updated 2 years ago
- Dump ntds.dit really fast☆403Updated 3 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆493Updated 4 years ago
- A robust tunelling solution written in golang☆269Updated 2 years ago
- Universal Shared Library User-space Loader☆229Updated 3 years ago
- TCP Port Redirection Utility☆736Updated 2 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆203Updated last year
- Various Cobalt Strike BOFs☆673Updated 2 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆742Updated 11 months ago
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆394Updated 3 months ago
- 🕳 godoh - A DNS-over-HTTPS C2☆784Updated last year
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆468Updated 2 years ago
- A tool to make socks connections through HTTP agents☆714Updated 4 years ago
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆459Updated last year
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆692Updated 2 years ago
- shellcode loader for your evasion needs☆336Updated 3 months ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,158Updated 4 months ago
- Creating a repository with all public Beacon Object Files (BoFs)☆512Updated last year
- indirect syscalls for AV/EDR evasion in Go assembly☆332Updated 2 years ago
- PIC lsass dumper using cloned handles☆592Updated 2 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆234Updated 5 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆980Updated 2 years ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆379Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniques☆378Updated 2 years ago
- A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls o…☆1,129Updated 2 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆468Updated 2 years ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆488Updated 2 years ago