1d8 / bstryLinks
Nimlang "Ransomware" Malware For Linux
☆21Updated 4 years ago
Alternatives and similar repositories for bstry
Users that are interested in bstry are comparing it to the libraries listed below
Sorting:
- a simple backdoor in Nim☆19Updated 3 years ago
- Interactive Windows Reverse Shell Server/Client☆42Updated 4 years ago
- ShellcodeFluctuation PoC ported to Nim☆77Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- A cross-platform Nim implant for Prelude Operator☆32Updated 3 years ago
- SMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique☆90Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆45Updated 3 years ago
- A quick example of the Hells Gate technique in Nim☆96Updated 3 years ago
- Basic Dart reverse shell code☆21Updated last year
- Run python from a single exe☆35Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆94Updated 2 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated 3 months ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- A collection of offensive Nim example code☆75Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 2 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆67Updated last year
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆51Updated last year
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- ☆33Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago