redcode-labs / Coldfire
Golang malware development library
☆952Updated 5 months ago
Alternatives and similar repositories for Coldfire
Users that are interested in Coldfire are comparing it to the libraries listed below
Sorting:
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,118Updated last month
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,814Updated last year
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆999Updated 2 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆840Updated 2 years ago
- Research code & papers from members of vx-underground.☆1,233Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,094Updated 3 years ago
- Template-Driven AV/EDR Evasion Framework☆1,680Updated last year
- A collection of Offensive Go packages.☆213Updated 3 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,204Updated last year
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,452Updated last year
- Open source C2 server created for stealth red team operations☆810Updated 2 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,767Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,442Updated last year
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆1,904Updated 5 months ago
- A dedicated place for cool golang security projects☆715Updated 11 months ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆508Updated 2 years ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆849Updated 4 years ago
- Golang library for malware development☆351Updated 5 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,611Updated 2 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,916Updated 2 months ago
- Second Version of The GoBot Botnet, But more advanced.☆737Updated 3 years ago
- The Hunt for Malicious Strings☆1,210Updated 2 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,500Updated 3 years ago
- A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls o…☆1,106Updated 2 years ago
- A tool for generating fake code signing certificates or signing real ones☆919Updated 2 years ago
- Open-Source Shellcode & PE Packer☆1,947Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,787Updated 11 months ago
- Resources for Windows exploit development☆1,574Updated 3 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆1,198Updated 11 months ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆375Updated 3 years ago