Skip to content
Praetorian Logo
  • Platform

    Platform

    • Chariot Overview
    • Continuous Threat Exposure Management
    • Attack Surface Management
    • Vulnerability Management
    • Cyber Threat Intelligence
    • Continuous Penetration Testing
    • Adversarial Exposure Validation
    • Chariot Overview
    • Continuous Threat Exposure Management
    • Attack Surface Management
    • Vulnerability Management
    • Cyber Threat Intelligence
    • Continuous Penetration Testing
    • Adversarial Exposure Validation
  • Services

    Penetration Testing Services

    • AI/ML Penetration Testing
    • Application Penetration Testing
    • Attack Path Mapping
    • Automotive Penetration Testing
    • Cloud Penetration Testing
    • IoT Penetration Testing
    • Network Penetration Testing
    • AI/ML Penetration Testing
    • Application Penetration Testing
    • Attack Path Mapping
    • Automotive Penetration Testing
    • Cloud Penetration Testing
    • IoT Penetration Testing
    • Network Penetration Testing

    Advanced Offensive Security

    • Assumed Breached
    • CI/CD Attack Chains
    • NIST CSF Benchmark
    • Purple Team
    • Red Team
    • Assumed Breached
    • CI/CD Attack Chains
    • NIST CSF Benchmark
    • Purple Team
    • Red Team

    Managed Services

    • Chariot Overview
    • Continuous Threat Exposure Management
    • Attack Surface Management
    • Vulnerability Management
    • Cyber Threat Intelligence
    • Continuous Penetration Testing
    • Adversarial Exposure Validation
    • Chariot Overview
    • Continuous Threat Exposure Management
    • Attack Surface Management
    • Vulnerability Management
    • Cyber Threat Intelligence
    • Continuous Penetration Testing
    • Adversarial Exposure Validation
  • Why Praetorian

    Customer Case Studies

    • 21st Century Fox
    • 2U
    • Bookings Holdings
    • Nielsen
    • OpenTable
    • Priceline
    • Samsung
    • X
    • Zoom
    • See All Customers
    • 21st Century Fox
    • 2U
    • Bookings Holdings
    • Nielsen
    • OpenTable
    • Priceline
    • Samsung
    • X
    • Zoom
    • See All Customers

    Resources

    • Security Blog
    • Resource Library
    • Labs
    • GitHub
    • MITRE ATT&CK
    • Speaking and Events
    • Warlocks
    • Security Blog
    • Resource Library
    • Labs
    • GitHub
    • MITRE ATT&CK
    • Speaking and Events
    • Warlocks

    Use Cases

    • ASM for Healthcare
    • Bug Bounty Cost Reduction
    • FDA Testing and Monitoring
    • Mergers and Acquisitions
    • Ransomware Prevention
    • Rogue IT Identification
    • Tool and Vendor Consolidation
    • Vendor Risk Management
    • ASM for Healthcare
    • Bug Bounty Cost Reduction
    • FDA Testing and Monitoring
    • Mergers and Acquisitions
    • Ransomware Prevention
    • Rogue IT Identification
    • Tool and Vendor Consolidation
    • Vendor Risk Management
  • About

    About Praetorian

    • Overview
    • Leadership
    • In the News
    • Press Releases
    • Contact Us
    • Overview
    • Leadership
    • In the News
    • Press Releases
    • Contact Us

    Join Praetorian

    • Culture
    • Careers
    • People Ops Blog
    • Tech Challenges​
    • New Hire Survival Guide
    • Culture
    • Careers
    • People Ops Blog
    • Tech Challenges​
    • New Hire Survival Guide
  • Start with Freemium
  • Contact Us

Author: Nathan Sportsman

Introducing Goffloader: A Pure Go Implementation of an In-Memory COFFLoader and PE Loader

We are excited to announce the release of Goffloader, a pure Go implementation of an in-memory COFFLoader and PE loader. This tool is designed to facilitate the easy execution of Cobalt Strike BOFs and unmanaged PE files directly in memory without writing any files to disk. Goffloader aims to take functionality that is conventionally within […]

Praetorian Logo
Continuous Threat Exposure Management
  • Chariot
  • Attack Surface Management
  • Vulnerability Management
  • Cyber Threat Intelligence
  • Continuous Penetration Testing
  • Breach and Attack Simulation
Professional Services
  • AI/ML Penetration Testing
  • Application Penetration Testing
  • Assumed Breached Exercise
  • Attack Path Mapping
  • Automotive Penetration Testing
  • CI/CD Security Engagement
  • Cloud Penetration Testing
  • IoT Penetration Testing
  • Network Penetration Testing
  • NIST CSF Benchmark
  • Purple Team
  • Red Team
Use Cases
  • Bug Bounty Cost Reduction
  • FDA Testing and Monitoring
  • Mergers and Acquisitions
  • Ransomware Prevention
  • Rogue IT Identification
  • Tool and Vendor Consolidation
  • Vendor Risk Management
Company
  • About Us
  • Leadership Team
  • Press Releases
  • In the News
  • Contact Us
  • Resource Library
  • Security Blog
  • People Ops Blog
  • Careers We're Hiring!
  • Culture
  • Tech Challenges
  • Survival Kit

Subscribe to our Newsletter

Catch our latest exploits, news, articles, and events.

Privacy Policy | Responsible Disclosure Policy | Terms of Service | Terms and Conditions

Copyright © 2025. All Rights Reserved.

Linkedin-in X-twitter Facebook-f Github Youtube