Sleep obfuscation in golang based on ekko
☆14Jan 16, 2024Updated 2 years ago
Alternatives and similar repositories for goEkko
Users that are interested in goEkko are comparing it to the libraries listed below
Sorting:
- Ghosting-AMSI☆18Apr 30, 2025Updated 10 months ago
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 8 months ago
- A PoC package for hosting the CLR and executing .NET from Go☆78Jul 9, 2024Updated last year
- ☆16Jun 15, 2025Updated 9 months ago
- ☆16Jan 30, 2022Updated 4 years ago
- This project is an AES loader for c2 shellcode☆36Jan 24, 2024Updated 2 years ago
- easy dll proxying in go☆14Apr 24, 2022Updated 3 years ago
- Frida plugin for Binary Ninja☆20Jan 12, 2025Updated last year
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆68Jan 14, 2025Updated last year
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 8 months ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Lastest Hashcat rules for password cracking☆69Feb 7, 2026Updated last month
- Minidump loader for Binary Ninja☆15Sep 25, 2025Updated 5 months ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Jan 1, 2024Updated 2 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 3 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- Tiny and fast port scanner (Sliver edition)☆28Feb 17, 2026Updated last month
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Fast and simple link shortener☆12Dec 17, 2022Updated 3 years ago
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 5 months ago
- Automated phishing catcher☆12Nov 27, 2025Updated 3 months ago
- ☆110Feb 17, 2025Updated last year
- ☆10Aug 17, 2021Updated 4 years ago
- Simple benchmarking scripts to run on any machine to compare different C/C++ malloc implementations.☆17Jun 28, 2021Updated 4 years ago
- Windows API/constants, identity, and WinHTTP/WinINet for Go.☆19Mar 6, 2026Updated 2 weeks ago
- Sleep Obfuscation☆45Oct 13, 2022Updated 3 years ago
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆29Oct 2, 2024Updated last year
- A Binary Ninja plugin that uses bruteforced XFG hashes to recover precise function prototypes☆16Feb 7, 2024Updated 2 years ago
- Erebus is a payload generator written in Nim.☆17Jun 13, 2023Updated 2 years ago
- ☆128Dec 12, 2025Updated 3 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 6 months ago
- Delphi-Kawaii is a plugin for Ida Pro.☆22Jul 19, 2023Updated 2 years ago
- Its a coff loader ported to go☆20Oct 2, 2022Updated 3 years ago
- An Xdbg Plugin of the ERC Library.☆26Feb 1, 2024Updated 2 years ago
- Spartacus DLL/COM Hijacking Toolkit☆327May 4, 2024Updated last year
- ☆38Jun 5, 2023Updated 2 years ago
- This will create a health report for every machines in an MSP/EDB/Single Sophos Central console☆14Updated this week