whid-injector / awesome-GO-offensive-toolsView external linksLinks
List of Awesome Offensive Tools written in GO
☆203Feb 25, 2019Updated 6 years ago
Alternatives and similar repositories for awesome-GO-offensive-tools
Users that are interested in awesome-GO-offensive-tools are comparing it to the libraries listed below
Sorting:
- Android Mobile App for Controlling WHID Injector remotely.☆211Jan 7, 2023Updated 3 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,782Jul 27, 2024Updated last year
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass a…☆263Sep 22, 2023Updated 2 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- Official Black Hat Arsenal Security Tools Repository☆13Dec 7, 2017Updated 8 years ago
- Abusing Exchange via EWS☆152Sep 14, 2020Updated 5 years ago
- HTA encryption tool for RedTeams☆1,424Nov 9, 2022Updated 3 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆20May 2, 2017Updated 8 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- F# Implementation to spawn shellcode☆47Jun 6, 2018Updated 7 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆199Nov 19, 2017Updated 8 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Tool for password spraying RDP☆98Oct 12, 2018Updated 7 years ago
- Malicious Macro Generator☆831Apr 17, 2019Updated 6 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,612Dec 10, 2018Updated 7 years ago
- ☆39Oct 8, 2019Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- Powershell C2 Server and Implants☆574Nov 11, 2019Updated 6 years ago
- Shellcoding utilities☆224Dec 16, 2020Updated 5 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,194Oct 24, 2018Updated 7 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆728Jan 21, 2020Updated 6 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- Active Directory ACL exploitation with BloodHound☆754Nov 18, 2021Updated 4 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆526Apr 14, 2023Updated 2 years ago
- nextnet is a pivot point discovery tool written in Go.☆453Aug 4, 2025Updated 6 months ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- Deploy payloads to *Nix systems en masse☆108Apr 24, 2020Updated 5 years ago
- AntiVirus Evasion Tool☆1,740Apr 23, 2025Updated 9 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950May 8, 2019Updated 6 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆840Jun 25, 2024Updated last year