timwhitez / Doge-MemXLinks
Golang implementation of Reflective load PE from memory
☆62Updated 3 years ago
Alternatives and similar repositories for Doge-MemX
Users that are interested in Doge-MemX are comparing it to the libraries listed below
Sorting:
- ReturnGate, just like HellsGate.☆67Updated 2 years ago
- Fork & modify of Wireguard's Memmod☆32Updated 2 years ago
- load assembly executable file in memory☆41Updated last year
- use aswArPot.sys to kill process☆68Updated 2 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- ☆50Updated 3 years ago
- dump lsass☆37Updated 3 years ago
- Bypass EDR Create TaskServers☆37Updated 2 years ago
- ☆41Updated last year
- Beacon compiled using clang☆71Updated 2 years ago
- more conveniently Visual-Studio-BOF-template☆67Updated last year
- Reflective DLL injection Execution☆19Updated 2 years ago
- UAC_wenpon☆49Updated 3 years ago
- Code with Windows Hacker☆12Updated 2 years ago
- bypass UAC even when configured to always notify user☆30Updated 3 years ago
- ☆30Updated 2 years ago
- ScareCrow loader binary source which easier to read and learn☆25Updated 3 years ago
- desktop screenshot☆30Updated 2 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 3 years ago
- ☆91Updated 4 years ago
- MSSQL CLR for pentest.☆54Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆58Updated 3 years ago
- cmd2shellcode☆79Updated 4 years ago
- CVE-2020-1472 C++☆83Updated 2 years ago
- DLL Unhooking☆12Updated 4 years ago
- Use COM Component Bypass UAC,Dll Version☆35Updated 4 years ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Updated 2 years ago
- Self Cleanup in post-ex job☆58Updated 10 months ago
- RawCopy - Golang implementation☆23Updated 2 years ago