Sleep obfuscation in golang based on ekko
☆13Jan 16, 2024Updated 2 years ago
Alternatives and similar repositories for goEkko
Users that are interested in goEkko are comparing it to the libraries listed below
Sorting:
- ☆16Jun 15, 2025Updated 8 months ago
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 7 months ago
- Ghosting-AMSI☆18Apr 30, 2025Updated 10 months ago
- Tiny and fast port scanner (Sliver edition)☆27Feb 17, 2026Updated last week
- A PoC package for hosting the CLR and executing .NET from Go☆78Jul 9, 2024Updated last year
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆29Oct 2, 2024Updated last year
- Lastest Hashcat rules for password cracking☆67Feb 7, 2026Updated 3 weeks ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- This project is an AES loader for c2 shellcode☆36Jan 24, 2024Updated 2 years ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 8 months ago
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆68Jan 14, 2025Updated last year
- ☆127Dec 12, 2025Updated 2 months ago
- An Xdbg Plugin of the ERC Library.☆26Feb 1, 2024Updated 2 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Dec 1, 2025Updated 3 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- ☆38Jun 5, 2023Updated 2 years ago
- Transparent Proxy via Frida hooks☆35Oct 26, 2023Updated 2 years ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 6 months ago
- This will create a health report for every machines in an MSP/EDB/Single Sophos Central console☆14Nov 11, 2025Updated 3 months ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 9 months ago
- A simple, reliable and reasonably fast network capture analyzer.☆25Feb 7, 2026Updated 3 weeks ago
- ☆211Nov 28, 2023Updated 2 years ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆44Dec 19, 2025Updated 2 months ago
- Sleep Obfuscation☆45Oct 13, 2022Updated 3 years ago
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆59Oct 10, 2025Updated 4 months ago
- ☆109Feb 17, 2025Updated last year
- Spartacus DLL/COM Hijacking Toolkit☆321May 4, 2024Updated last year
- Get VirusTotal report for a given hash using PowerShell☆10Sep 20, 2022Updated 3 years ago
- Pine and Frida better together☆15Oct 30, 2024Updated last year
- DLL Hijacking Detection Tool☆16Jun 21, 2025Updated 8 months ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Test antiviruses☆12Dec 3, 2023Updated 2 years ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago