owen's repositories
go-native-syscall
go-native-syscall is Go (+ asm) Windows syscall library that resolves, hashes, caches, and invokes direct (and indirect now) NT calls without going through the win api layer traditionally
go-crypter
A cryptographic payload loader and executor designed for advanced in-memory execution techniques. This project combines strong encryption, compression, and sophisticated evasion capabilities to execute both shellcode and PE files directly in memory.
vulkan-proxy
fun way to proxy syscalls or regular function calls through vulkan-1.dll
go-wincall
load arbitrary dlls, call any exported function available to your PID's privs, all under a single thread without importing windows, syscall, or statically linking with any dlls beyond go's runtime requirements
go-nt-socket
a pure go implementation of 5mukx's NTSockets, with added functionality of shellcode injection
meltloader
a modular reflective dll/pe loader that allows for easy chaining of dlls and pes together in a single or remote process with tight memory management and encryption capabilities to evade memory scanners. no syscall, windows, or net/http import involved.
rtl-gadget-injection
this project implements a remote shellcode injection technique using asynchronous procedure calls (apcs) combined with rtl function gadgets for memory writing. the method leverages windows ntdll functions as execution primitives to write shellcode into target processes without traditional writeprocessmemory calls.
m1-shellcode
this is a tiny poc for shellcode injection in pure go and go's shitty plan9 asm on arm64 macOS tested on an m1 chip
opengl32-proxy
a proof-of-concept demonstrating a control flow redirection technique within `opengl32.dll`
wincall-sh
this project demonstrates creative shellcode execution techniques using my go-wincall API :3 x64 only
export-dump
dump any accessible dll's exports easily
forge-passkeys-go
A Go implementation of the "Forging Passkeys" research demonstrating virtual FIDO2/WebAuthn authenticators.
go-m1call
dynamic function calling and symbol resolution for macos arm64 systems. directly interfaces with the dyld shared cache to resolve and call exported symbols without static linking.
LitterBox
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabilities.
syshash
a c implementation for native syscall resolution and execution on windows x64