timwhitez / Doge-MemX
Golang implementation of Reflective load PE from memory
☆59Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Doge-MemX
- ReturnGate, just like HellsGate.☆65Updated 2 years ago
- CVE-2020-1472 C++☆83Updated 2 years ago
- more conveniently Visual-Studio-BOF-template☆53Updated last year
- cmd2shellcode☆78Updated 3 years ago
- ☆46Updated 3 years ago
- ☆38Updated last year
- UAC_wenpon☆48Updated 2 years ago
- kill AV/EDR☆21Updated last year
- dump lsass☆36Updated 2 years ago
- AddDefenderExclusions Beacon Object File☆31Updated last year
- 调用x64dbg中的loadll.exe白加黑示例代码☆60Updated 4 months ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Updated 2 years ago
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆30Updated 2 years ago
- [windows]pe -> shellcode -> shellcodeLoader -> (pe2shellcode go on?)☆75Updated 2 years ago
- Self Cleanup in post-ex job☆42Updated 2 months ago
- golang+c#乱写了一个基于http的垃圾远控(支持团队协同作战,功能很少)(三端)☆41Updated 2 years ago
- Bypass EDR Create TaskServers☆34Updated last year
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆46Updated 3 years ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆19Updated last year
- Fork & modify of Wireguard's Memmod☆31Updated last year
- kill windows log☆45Updated 7 months ago
- ☆44Updated 3 years ago
- load assembly executable file in memory☆37Updated last year
- CrackMapExec extension module/protocol support☆40Updated last year
- ☆89Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 2 years ago
- A SigFlip implement in golang☆37Updated 2 years ago
- A decentralized basic Trojan framework that eliminates C2 mode and is implemented by P2P, the core networking technology of blockchain☆34Updated 7 months ago
- ☆30Updated last year