1d8 / bstryLinks
Nimlang "Ransomware" Malware For Linux
☆22Updated 5 years ago
Alternatives and similar repositories for bstry
Users that are interested in bstry are comparing it to the libraries listed below
Sorting:
- a simple backdoor in Nim☆19Updated 4 years ago
- Interactive Windows Reverse Shell Server/Client☆42Updated 4 years ago
- SMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique☆90Updated 3 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- A cross-platform implant written in Nim☆175Updated last year
- A collection of offensive Nim example code☆74Updated 4 years ago
- grim reaper c2☆346Updated 3 years ago
- PE Crypter written in Nim☆101Updated 4 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Updated 4 years ago
- A cross-platform Nim implant for Prelude Operator☆31Updated 4 years ago
- PyHook is an offensive API hooking tool written in python designed to catch various credentials within the API call.☆190Updated last year
- Run python from a single exe☆35Updated 3 years ago
- COFF and BOF Loader written in Nim☆176Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆133Updated 4 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆96Updated 3 years ago
- ☆42Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Updated 2 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 4 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆202Updated 6 months ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆92Updated 4 years ago
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Updated 4 years ago
- Winsock accept() Backdoor Implant.☆118Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Updated 6 years ago
- Load Windows DLL from memory☆136Updated 2 years ago
- PowerShell payload generator☆120Updated 4 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆166Updated 4 years ago
- A quick example of the Hells Gate technique in Nim☆96Updated 4 years ago