malware-unicorn / GoPEInjection
Golang PE injection on windows
☆158Updated 3 years ago
Related projects: ⓘ
- ☆150Updated this week
- ☆164Updated 3 years ago
- Reflective DLL loading of your favorite Golang program☆164Updated 4 years ago
- Move CS beacon to GPU memory when sleeping☆212Updated 2 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆230Updated 2 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆262Updated 4 months ago
- Go implementation of the Heaven's Gate technique☆92Updated 3 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆227Updated 4 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆258Updated 3 years ago
- ☆228Updated this week
- Apply a filter to the events being reported by windows event logging☆259Updated 3 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆127Updated last year
- A Beacon Object File (BOF) is a compiled C program, written to a convention that allows it to execute within a Beacon process and use int…☆111Updated 2 months ago
- Pass the Hash to a named pipe for token Impersonation☆291Updated 9 months ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆212Updated last year
- Windows MSI Installer LPE (CVE-2021-43883)☆76Updated 2 years ago
- ☆71Updated 2 years ago
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆236Updated 7 months ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆206Updated 3 years ago
- Load any Beacon Object File using Powershell!☆245Updated 2 years ago
- (kinda) Malicious Outlook Reader☆132Updated 3 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆177Updated 3 years ago
- Remove API hooks from a Beacon process.☆263Updated 3 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆217Updated 6 months ago
- PowerShell script to generate "proxy" counterparts to easily perform DLL Sideloading☆113Updated 5 years ago
- ☆140Updated this week
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆161Updated 3 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆265Updated last year
- An effort to track security vendors' use of Microsoft's Antimalware Scan Interface☆227Updated 2 years ago