neox41 / go-procinjectLinks
Process Injection Techniques with Golang
☆79Updated 5 years ago
Alternatives and similar repositories for go-procinject
Users that are interested in go-procinject are comparing it to the libraries listed below
Sorting:
- Process injection techniques written in Go.☆62Updated last year
- A PoC package for hosting the CLR and executing .NET from Go☆74Updated 11 months ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆232Updated 4 years ago
- Golang version of https://github.com/hasherezade/libpeconv☆27Updated 5 years ago
- Go implementation of the Heaven's Gate technique☆98Updated 4 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆340Updated 2 years ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆100Updated 9 months ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆112Updated 4 years ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆66Updated last year
- Reflective DLL loading of your favorite Golang program☆170Updated 5 years ago
- Another Go Shellcode Loader using Windows APIs☆140Updated 3 years ago
- Golang PE injection on windows☆166Updated 3 years ago
- Automated compiler obfuscation for nim☆140Updated 2 years ago
- A PoC implementation for dynamically masking call stacks with timers.☆277Updated 2 years ago
- Really stupid re-implementation of invoke-wmiexec☆216Updated 2 years ago
- This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of alm…☆107Updated 2 years ago
- Silence EDRs by removing kernel callbacks☆234Updated 4 years ago
- Allow a Go process to dynamically load .NET assemblies☆149Updated 5 years ago
- Reflectively load PE☆103Updated 4 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆156Updated 4 years ago
- PowerShell script to generate "proxy" counterparts to easily perform DLL Sideloading☆125Updated 5 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆119Updated 4 years ago
- A Go implementation of Cobalt Strike style BOF/COFF loaders.☆223Updated 3 months ago
- execute a PE in the address space of another PE aka process hollowing☆56Updated 3 years ago
- You shall pass☆261Updated 2 years ago
- BOF combination of KillDefender and Backstab☆167Updated 2 years ago
- Load and execute COFF files and Cobalt Strike BOFs in-memory☆217Updated 2 years ago
- Project to check which Nt/Zw functions your local EDR is hooking☆192Updated 4 years ago
- Exploring in-memory execution of .NET☆138Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆218Updated 3 years ago