timwhitez / Doge-AssemblyLinks
Golang evasion tool, execute-assembly .Net file
☆97Updated 3 years ago
Alternatives and similar repositories for Doge-Assembly
Users that are interested in Doge-Assembly are comparing it to the libraries listed below
Sorting:
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 2 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆69Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆83Updated 2 years ago
- Golang Direct Syscall☆30Updated 3 years ago
- Load shellcode via syscall☆54Updated 3 years ago
- ShellCodeLoader via DInvoke☆57Updated 3 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- dump lsass☆37Updated 3 years ago
- Another Go Shellcode Loader using Windows APIs☆140Updated 3 years ago
- A Custom CLR Assembly for MSSQL of the popular tool GodPotato☆78Updated 2 years ago
- ReturnGate, just like HellsGate.☆67Updated 2 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆45Updated 3 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆16Updated 3 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆112Updated 4 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆59Updated 3 years ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆55Updated last year
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆140Updated 3 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 4 years ago
- Cobalt Strike BOF Files with Nim!☆85Updated 2 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆126Updated 3 years ago
- cmd2shellcode☆79Updated 4 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆60Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆38Updated 3 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- Loader that loads shellcode from UUID's☆22Updated 4 years ago
- It stinks☆102Updated 3 years ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆66Updated last year