yoda66 / GoShellcodeLinks
☆72Updated 3 years ago
Alternatives and similar repositories for GoShellcode
Users that are interested in GoShellcode are comparing it to the libraries listed below
Sorting:
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- easy-to-use payload hosting☆271Updated 3 years ago
- ☆112Updated 2 years ago
- ☆164Updated 2 years ago
- Exchangelib wrapper for pentesting☆65Updated 7 months ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆122Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- An Ansible role for installing Cobalt Strike.☆80Updated last month
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆147Updated 5 years ago
- ☆96Updated 3 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆179Updated 2 years ago
- MSBuild without MSbuild.exe☆132Updated 4 years ago
- Start new PowerShell without etw and amsi in pure nim☆156Updated 3 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- Code Exec via Excel☆87Updated 8 years ago
- Source for tasks I have used with Covenant☆120Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- Python based BloodHound data importer☆147Updated 2 years ago
- Run Rubeus via Rundll32☆200Updated 5 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Simple APPLocker bypass summary☆43Updated 6 years ago
- Petaq - Purple Team Command & Control Server☆105Updated 2 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- Dump stuff without touching disk☆165Updated 4 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆123Updated 4 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆131Updated 2 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆233Updated 5 years ago
- ☆67Updated 2 years ago