lu4p / go-escalateLinks
The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
☆37Updated 2 years ago
Alternatives and similar repositories for go-escalate
Users that are interested in go-escalate are comparing it to the libraries listed below
Sorting:
- Shellcode process injector☆28Updated 5 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- Encryption Abstraction Layer and Utilities for ratnet☆18Updated last year
- Golang Implant & Post-Exploitation Framework☆59Updated 2 years ago
- ☆33Updated 5 years ago
- Modular rootkit framework.☆30Updated 4 years ago
- Rosie the Pivoter☆17Updated 7 years ago
- A Chrome cookie dumping utility☆45Updated 5 years ago
- Docker kinsing malware bitcoin/xmr miner☆23Updated 4 years ago
- execute a PE in the address space of another PE aka process hollowing☆59Updated 3 years ago
- ICMP scan all hosts across a given subnet in Go (golang)☆28Updated 5 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- An intuitive and encrypted in-memory filesystem (VFS)☆101Updated 2 years ago
- Shellcode library as a Go package☆70Updated 5 years ago
- DNS server for pentesters☆50Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- ☆16Updated 5 years ago
- Simple golang reverse shell☆21Updated 5 years ago
- Provides access to libhashcat☆31Updated last year
- Reverse shell using go☆38Updated 6 years ago
- The best way to send emails in Go.☆11Updated 4 years ago
- Cross-platform proxy selection with optional native authentication negotiation☆51Updated 2 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 7 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- Network Finger Printer☆16Updated 7 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Reflectively load PE☆104Updated 5 years ago
- This is the ToRat client, a part of the ToRat Project.☆25Updated 5 years ago