oiweiwei / go-msrpcLinks
The DCE/RPC / MS-RPC Codegen/Client for Go
☆134Updated this week
Alternatives and similar repositories for go-msrpc
Users that are interested in go-msrpc are comparing it to the libraries listed below
Sorting:
- A PoC package for hosting the CLR and executing .NET from Go☆77Updated last year
- A Go implementation of Cobalt Strike style BOF/COFF loaders.☆247Updated 9 months ago
- A client library to interact with Windows RPC services such as MS-SRVS and MS-RRP.☆73Updated last month
- Single executable reverse SOCKS5 proxy written in Golang.☆144Updated last month
- Golang implementation of @CCob's C# ThreadlessInject☆31Updated last year
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆65Updated last year
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆63Updated 2 years ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆182Updated 4 months ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated 2 years ago
- ☆92Updated last year
- A library to make HTTP requests with the Windows winhttp API☆24Updated last year
- ☆144Updated 2 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Updated 9 months ago
- Beacon Object File (BOF) Template☆59Updated last year
- Execute commands in other Sessions☆91Updated last year
- Extracts TEXT section of a PE, ELF, or Mach-O executable to shellcode☆105Updated 2 years ago
- Library of BOFs to interact with SQL servers☆213Updated 2 weeks ago
- Go Shellcode Loader to be Integrated in Exploration C2☆28Updated 10 months ago
- To audit the security of read-only domain controllers☆117Updated 2 years ago
- ☆83Updated 2 years ago
- ApexLdr is a DLL Payload Loader written in C☆115Updated last year
- ☆235Updated last year
- ☆45Updated 2 months ago
- An App Domain Manager Injection DLL PoC on steroids☆208Updated 2 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆87Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Updated 2 years ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆153Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆156Updated 2 years ago
- Perform DCSync operation without mimikatz☆153Updated last year
- Port of Cobalt Strike's Process Inject Kit☆189Updated last year